Monday Cisco Talos discovered a multistage attack used to infect target endpoint with customized Cobalt Strike beacons. The malware campaign use military themed malicious ms office document help Talos to determine that it is used to attack military and government organization in south asia the malware containing the full RAT capabilities.
Talos described its working as "The attack consists of a highly modular dropper executable we're calling "IndigoDrop" dropped to a victim's endpoint using maldocs. IndigoDrop is responsible for obtaining the final payload from a download URL for deployment. The final payloads currently observed by Talos are Cobalt Strike beacons."
Read Full report at Cisco Talos Blog post
Subscribe to:
Post Comments (Atom)
Nimbus Manticore Malware Campaign Puts Defense and Telecom on Alert
Nimbus Manticore Intensifies Attacks on Defense and Telecom Sectors With New Malware The Iranian state-aligned threat actor Nimbus Mantic...
-
Critical Ingress NGINX Controller Vulnerabilities Expose Kubernetes Clusters to Remote Code Execution A set of five critical security vuln...
-
https://www.securityweek.com VMware Urges Immediate Updates for Critical Cloud and Virtualization Vulnerabilities Broadcom-owned VMware is...
-
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp A suspected Russian hacking group known as Wate...
No comments:
Post a Comment