July 3, 2024, 7:05 a.m. | info@thehackernews.com (The Hacker News)

The Hacker News thehackernews.com

The loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal.
"FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif," the company said in a Tuesday analysis.
Drive-by attacks

as-a-service attacks distributed download drive drive-by fakebat families findings icedid loader lumma malware malware families next payload redline reveal sectoprat sekoia service smokeloader stage the company ursnif using

Microsoft Active Directory Engineer - TS/SCI with Polygraph

@ General Dynamics Information Technology | USA VA Chantilly - 14700 Lee Rd (VAS100)

GSOC Analyst & Team Lead

@ Western Digital | Colorado Springs, CO, United States

FAIT Manager - IT Risk Assessment - Dublin

@ EY | Dublin 2, IE

FAIT Senior Manager - IT Risk Assessment - Dublin

@ EY | Dublin 2, IE

Engineer - Sailpoint IdentityNow I Remote, Bangalore

@ Optiv | Bengaluru

Security Sales Specialist

@ NTT DATA | Madrid, Spain