Feb. 20, 2024, 1 p.m. | Petar Kirhmajer

ReversingLabs Blog blog.reversinglabs.com





ReversingLabs researchers have observed a clear trend in which open-source platforms and code have become the stage for a growing and diverse range of malicious activity and campaigns. This trend includes hosting malicious command-and-control (C2) infrastructure, storing stolen data, and delivering second- and third- stage malware including downloaders and rootkit programs. The team's most recent discovery suggests that trend is continuing in 2024. 


On January 10, ReversingLabs reverse engineer Karlo Zanki discovered two suspicious packages on the open-source package manager …

attackers campaigns clear code command control data hosting infrastructure malicious malware platforms pypi researchers reversinglabs rootkit sideload stage stolen team third threat research trend

More from blog.reversinglabs.com / ReversingLabs Blog

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote