July 5, 2024, 1:50 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Aside from leveraging malvertising aimed at Microsoft Teams and OneNote, AnyDesk, Google Chrome, and other widely used software, attackers also sought to spread FakeBat via social networking-based social engineering tactics and fraudulent web browser updates.


Article Link: Drive-by download attacks leveraged for FakeBat loader deployment | SC Media


1 post - 1 participant


Read full topic

anydesk article attackers attacks browser chrome deployment download drive drive-by engineering fakebat fraudulent google google chrome link loader malvertising media microsoft microsoft teams networking onenote social social engineering social engineering tactics social networking software tactics teams updates web web browser

Network Engineer (travel required)

@ General Dynamics Information Technology | USA VA Springfield - Customer Proprietary (VAC421)

NOSC (Network Operation Security Center)– Battle Captain

@ General Dynamics Information Technology | USA FL MacDill AFB - 7115 S Boundary Blvd (FLC096)

Senior Director, Information Governance and Privacy

@ IQVIA | Sofia, Bulgaria

Manager, Internal Audit

@ Vancity | Vancouver, British Columbia, Canada

Risk Consulting - Protect Tech - Manager - ITAC

@ EY | Bengaluru, KA, IN, 560016

Software Engineering Manager

@ BT Group | RMZ Ecoworld, Devarabeesanahal, Bengaluru, India