June 30, 2023, 10:35 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.


Article Link: Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator


1 post - 1 …

alphv application blackcat distribution entry file file transfer identify infection led malicious malicious actors malvertising malware organizations terminator transfer well-known windows

Sr. Cloud Security Engineer

@ BLOCKCHAINS | USA - Remote

Network Security (SDWAN: Velocloud) Infrastructure Lead

@ Sopra Steria | Noida, Uttar Pradesh, India

Senior Python Engineer, Cloud Security

@ Darktrace | Cambridge

Senior Security Consultant

@ Nokia | United States

Manager, Threat Operations

@ Ivanti | United States, Remote

Lead Cybersecurity Architect - Threat Modeling | AWS Cloud Security

@ JPMorgan Chase & Co. | Columbus, OH, United States