all InfoSec news
Malvertising campaign deploys Oyster backdoor via trojanized software installers
June 26, 2024, 3:02 p.m. | SC Staff
SC Magazine feed for Risk Management www.scmagazine.com
Intrusions involved luring targets to download a setup binary from legitimate-looking fraudulent websites that directly deploys the Oyster malware, marking a change from the previous usage of a dedicated loader for the payload.
backdoor binary campaign change download fraudulent loader malvertising malvertising campaign malware network security payload setup software websites
More from www.scmagazine.com / SC Magazine feed for Risk Management
Jobs in InfoSec / Cybersecurity
Watch Officer and Operations Officer
@ Interclypse | Arlington, VA, US
Sales Development Representative
@ Devo | United States
Principal Software Engineer
@ Oracle | Seattle, WA, United States
Engineering Manager, Cloud - TDIR (Remote)
@ CrowdStrike | USA CA Remote
Linux System Administrator II
@ Peraton | Fort Meade, MD, United States
Linux System Administrator
@ Peraton | Fort Meade, MD, United States