Feb. 13, 2024, 11:29 p.m. | /u/reliaquest_official

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

While investigating customer detections in Q1 2024, ReliaQuest researchers identified the fake-update malware variant [“SocGholish” ingressing Python](https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/?utm_source=reddit&utm_medium=social&utm_content=blog)—rather than Blister Loader—to establish persistence with a scheduled task, signaling an evolution in the malware’s behavior.

* SocGholish is using drive-by compromise in this new method to trick users into downloading a malicious JavaScript file. The file then downloads and extracts Python from a trusted domain and creates a scheduled task to run a malicious Python script.
* ReliaQuest believes this tactic will …

blueteamsec capabilities compromise defense domain downloads drive drive-by evasion file javascript malicious obfuscated organizations powershell powershell scripts python python script reliaquest run scheduled task script scripts socgholish tactic task

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Architect - Northwest region (Remote)

@ GuidePoint Security LLC | Remote

Senior Consultant, Cyber Security Architecture

@ 6point6 | Manchester, United Kingdom

Junior Security Architect

@ IQ-EQ | Port Louis, Mauritius

Senior Detection & Response Engineer

@ Expel | Remote

Cyber Security Systems Engineer ISSE Splunk

@ SAP | Southbank (Melbourne), VIC, AU, 3006