#dll-side-loading

[ follow ]
Information security
fromTechzine Global
2 days ago

EU diplomats targeted by Chinese attackers via Windows exploit

UNC6384 (Mustang Panda) targeted European diplomatic and defense entities using ZDI-CAN-25373 .lnk exploits to deploy PlugX RAT via DLL side-loading.
fromThe Hacker News
1 week ago

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

Salt Typhoon, also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC5807, is the name given to an advanced persistent threat actor with ties to China. Known to be active since 2019, the group gained prominence last year following its attacks on telecommunications services providers, energy networks, and government systems in the U.S. The adversary has a track record of exploiting security flaws in edge devices, maintaining deep persistence, and exfiltrating sensitive data from victims in more than 80 countries across
Information security
Information security
fromThe Hacker News
3 weeks ago

From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware

China-aligned UTA0388 conducts multilingual, tailored spear-phishing campaigns delivering Go-based GOVERSHELL backdoor via DLL side-loading to targets across North America, Asia, and Europe.
Information security
fromThe Hacker News
1 month ago

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Confucius targeted Pakistan using spear-phishing and malicious files to deploy WooperStealer and the Python backdoor Anondoor via DLL side-loading.
Information security
fromThe Hacker News
1 month ago

Russian APT28 Deploys "NotDoor" Outlook Backdoor Against Companies in NATO Countries

APT28 deployed an Outlook VBA backdoor called NotDoor that monitors emails for a trigger to exfiltrate data, upload files, execute commands, and persist via DLL side-loading.
fromThe Hacker News
2 months ago

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger

Cybersecurity researchers have disclosed details of a new malware loader called QuirkyLoader that's being used to deliver via email spam campaigns an array of next-stage payloads ranging from information stealers to remote access trojans since November 2024. Some of the notable malware families distributed using QuirkyLoader include Agent Tesla, AsyncRAT, Formbook, Masslogger, Remcos RAT, Rhadamanthys Stealer, and Snake Keylogger. IBM X-Force, which detailed the malware, said the attacks involve sending spam emails from both legitimate email service providers and a self-hosted email server.
Information security
[ Load more ]