March 19, 2024, 4:16 p.m. | Guru baran

GBHackers On Security gbhackers.com

A new campaign has been identified as DEEP#GOSU is likely linked to the Kimsuky group, and it employs a new script-based attack chain that uses numerous PowerShell and VBScript stagers to stealthily infect systems.  Its features included data exfiltration, keylogging, clipboard monitoring, dynamic payload execution, and persistence via scheduled activities, self-executing PowerShell scripts using jobs, and RAT software […]


The post Novel Script-Based Attack That Leverages PowerShell And VBScript appeared first on GBHackers on Security | #1 Globally Trusted Cyber …

attack attack chain campaign clipboard cyber-attack cyber security data data exfiltration dynamic exfiltration features infect keylogging kimsuky malware monitoring novel payload persistence powershell script systems vbscript

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Security Compliance Manager

@ Aptiv | USA Boston Software Office 100 Northern - Eng

Senior Radar Threat Analyst | Secret clearance

@ Northern Trust | USA CA Point Mugu - 575 I Ave, Bldg 3015 (CAC212)

Space Information Systems Security Engineer (ISSE)

@ Parsons Corporation | USA VA Chantilly (Client Site)

Information Systems Security Manager -Journeyman

@ Parsons Corporation | USA CO Colorado Springs (5450 Tech Center Drive)

Information Systems Security Officer (ISSO) II

@ Northern Trust | USA CA Riverside - Customer Proprietary (CAC225)