all InfoSec News
FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
July 3, 2024, 7:05 a.m. | info@thehackernews.com (The Hacker News)
The Hacker News thehackernews.com
"FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif," the company said in a Tuesday analysis.
Drive-by attacks
as-a-service attacks distributed download drive drive-by fakebat families findings icedid loader lumma malware malware families next payload redline reveal sectoprat sekoia service smokeloader stage the company ursnif using
More from thehackernews.com / The Hacker News
Brazil Halts Meta's AI Data Processing Amid Privacy Concerns
1 day, 11 hours ago |
thehackernews.com
Jobs in InfoSec / Cybersecurity
Microsoft Active Directory Engineer - TS/SCI with Polygraph
@ General Dynamics Information Technology | USA VA Chantilly - 14700 Lee Rd (VAS100)
GSOC Analyst & Team Lead
@ Western Digital | Colorado Springs, CO, United States
FAIT Manager - IT Risk Assessment - Dublin
@ EY | Dublin 2, IE
FAIT Senior Manager - IT Risk Assessment - Dublin
@ EY | Dublin 2, IE
Engineer - Sailpoint IdentityNow I Remote, Bangalore
@ Optiv | Bengaluru
Security Sales Specialist
@ NTT DATA | Madrid, Spain