New Redline Stealer Variant Leverages Lua Bytecode For Stealthiness

Redline Stealer is a powerful information-stealing malware, and hackers often exploit this stealthy stealer to gain unauthorized access to a victim’s sensitive data. Threat actors can steal many sensitive and valuable data by exploiting the Redline Stealer. Threat actors can use The stolen data later for financial gain or other malicious purposes. Cybersecurity researchers at…

Read More

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets. The email messages come with Scalable Vector Graphics (SVG) file attachments that, when clicked, activate the infection sequence, Fortinet FortiGuard…

Read More

Practical Guide to Simplify Your Malware Sandboxes Configuration

Malware sandboxes are integral to security applications like intrusion detection, forensics, and threat intelligence, but using them correctly is challenging due to choices in implementations, monitoring techniques, and configurations. Improper use can negatively impact applications through false positives, inconclusive analyses, and poor threat data. Prior works survey dynamic analysis methods for building and improving sandboxes, evasion…

Read More

What is Malware Packers? How To Analyse With ANY.RUN Sandbox – SOC/DIFR Guide

Antiviruses can quickly detect malicious executable files, but attackers can bypass this by using packers to compress and obfuscate the code, making it difficult for antivirus software to analyze. Packers are similar to compression tools like ZIP and RAR, but some packers, like UPX, specifically target executables. Packers, including legitimate ones (VMprotect, ASpack) and custom-made…

Read More