"We have identified four different side-loading scenarios that were used by the same threat actor," to install malware in the victims' Microsoft Windows devices for data exfiltration, Gabor Szappanos, ...
Researchers found a LinkedIn phishing campaign delivering a remote access trojan via DLL sideloading, WinRAR SFX files, and ...
Hackers are exploiting a side-loading flaw in a signed GitKraken executable to bypass defenses and deploy trojans, stealers, ...
Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware ...
A new, Chinese advanced persistent threat (APT) group making the rounds performs DLL side-loading attacks including the phrase "KilllSomeOne." According to Sophos researcher Gabor Szappanos, the group ...
The China-aligned APT (advanced persistent threat) group known as 'Bronze Starlight' was seen targeting the Southeast Asian gambling industry with malware signed using a valid certificate used by the ...
Dynamic-link library (DLL) side-loading occurs when Windows Side-by-Side (WinSxS) manifests are not explicit about the characteristics of DLLs being loaded by a program. In layman’s terms, DLL ...
At the core of PDFSIDER is an encrypted command-and-control (C2) channel. The malware embeds the Botan cryptographic library ...
A recent research report by Uptycs has highlighted the evolution of QuasarRAT, an open-source remote administration tool (RAT) known for its lightweight nature and range of malicious functions.
DLL sideloading and CVE attacks show diversity of threat landscape Your email has been sent Sideloading using link libraries as decoys S1deloader exploits social media for nefarious outcomes Attacks ...
Researchers studying cybersecurity have discovered a new and sophisticated phishing effort that spreads dangerous payloads ...