Feb. 13, 2024, 11:29 p.m. | /u/reliaquest_official

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

While investigating customer detections in Q1 2024, ReliaQuest researchers identified the fake-update malware variant [“SocGholish” ingressing Python](https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/?utm_source=reddit&utm_medium=social&utm_content=blog)—rather than Blister Loader—to establish persistence with a scheduled task, signaling an evolution in the malware’s behavior.

* SocGholish is using drive-by compromise in this new method to trick users into downloading a malicious JavaScript file. The file then downloads and extracts Python from a trusted domain and creates a scheduled task to run a malicious Python script.
* ReliaQuest believes this tactic will …

blueteamsec capabilities compromise defense domain downloads drive drive-by evasion file javascript malicious obfuscated organizations powershell powershell scripts python python script reliaquest run scheduled task script scripts socgholish tactic task

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC