Cisco Talos Sees New Brand Impersonation Methodologies from Malicious Actors

Executive Summary Cisco Talos has released a report detailing new findings around recent techniques, tactics, and procedures (TTPs) uncovered while investigating brand impersonation email campaigns. In the report, Cisco Talos detailed various novel TTPs used by threat actors to embed brand logos in emails, such as inserting brand-related words into HTML, using base64 encoding, fetching logos from…

Read More

HijackLoader Updated with New Evasion Techniques

On 6 May 2024, Zscaler researchers reported that the prevalent HijackLoader (also known as IDAT Loader) has been updated with new detection and analysis evasion techniques. Context and Technical Details According to Zscaler researchers, “HijackLoader now includes modules to add an exclusion for Windows Defender Antivirus, bypass User Account Control (UAC), evade inline API hooking…

Read More

Novel Botnet Exploiting High Severity Vulnerability in D-Link Devices

On 1 May 2024, Fortinet researchers published the technical details of a new botnet they dubbed “Goldoon” targeting a high severity vulnerability in D-Link devices Context and Technical Details According to researchers, “If a targeted device is compromised, attackers can gain complete control, enabling them to extract system information, establish communication with a C2 server,…

Read More

Widespread Adware targeting macOS “Adload” Adapting to Evade Apple XProtect Signatures

On 1 May 2024, SentinalOne researchers reported the technical details of an adware campaign leveraging Adload evading Apple XProtect defensive measures to target macOS users. Context and Technical Details In late April 2024, Apple released more than 80 new rules for the XProtect malware signature list. SentinalOne researchers identified a malware campaign mere days later…

Read More

Researchers Discover Mass Manipulation of GitHub Search Functionalities to Distribute Malware

Executive Summary Threat actors are taking advantage of GitHub’s search functionalities to deceive users looking for popular repositories into downloading malicious  counterparts that serve malware, according to a new report from Checkmarx. Attackers are utilizing techniques like automated updates and fake stars to boost search rankings and deceive users. Community Threat Assessment The use of malicious GitHub repositories to distribute…

Read More