Blog | G5 Cyber Security

Malware Developers Refresh Their Attack Tools

Attackers continue to make headway in hobbling defenders from detecting and analyzing their malware. Researchers analyzed the latest attack techniques associated with an information-stealing campaign. The LokiBot dropper uses three stages, each with a layer of encryption, to attempt to hide the eventual source of code. The attacks also use a variety of other attack techniques, such as socially engineering users to enable macros on Microsoft Office, using images to hide code, and widespread encryption of resources. More potential points of detection will mean a greater chance of detecting intrusions before they become breaches.”]

Source: https://www.darkreading.com/attacks-breaches/malware-developers-refresh-their-attack-tools

Exit mobile version