Monday Cisco Talos discovered a multistage attack used to infect target endpoint with customized Cobalt Strike beacons. The malware campaign use military themed malicious ms office document help Talos to determine that it is used to attack military and government organization in south asia the malware containing the full RAT capabilities.
Talos described its working as "The attack consists of a highly modular dropper executable we're calling "IndigoDrop" dropped to a victim's endpoint using maldocs. IndigoDrop is responsible for obtaining the final payload from a download URL for deployment. The final payloads currently observed by Talos are Cobalt Strike beacons."
Read Full report at Cisco Talos Blog post
Subscribe to:
Post Comments (Atom)
Google Uncovers LOSTKEYS Malware Tied to Russian Hackers
Google Uncovers 'LOSTKEYS' Malware Linked to Russian Hacking Group Cold River May 7, 2025 — Alphabet’s Google has disclosed the ...
-
DigiCert's Revocation of 83,000 Certificates: A Critical Security Move DigiCert has begun the process of revoking over 83,000 SSL/TLS ...
-
SuperBlack Ransomware Exploits Fortinet Vulnerabilities: A New Cyber Threat Emerges A Russian-linked threat actor, identified as Mora_001,...
-
Critical Ingress NGINX Controller Vulnerabilities Expose Kubernetes Clusters to Remote Code Execution A set of five critical security vuln...
No comments:
Post a Comment