Get a Pentest and security assessment of your IT network.

Cyber Security

Astaroth Trojan Uses Cloudflare Workers to Bypass AV Software

A new Astaroth Trojan variant uses Cloudflare Workers serverless computing platform to avoid detection and block automated analysis attempts. The Trojan is part of a three-stage infection process, starting with a phishing e-mail that comes with an HTML attachment containing obfuscated JavaScript code and linking to a domain that sits behind cloudflare’s infrastructure. The payload is downloaded using one of “ten randomized and unique URLs”” each with 900 million possible URL variations. The third stage uses DLL side-loading to hollow legitimate processes and loads a malicious DLL to get the final command and control.”

Source: https://www.bleepingcomputer.com/news/security/astaroth-trojan-uses-cloudflare-workers-to-bypass-av-software/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security