HomeNewsClickFix strategies evolve in new infostealer campaigns

ClickFix strategies evolve in new infostealer campaigns

The compromised websites didn’t share the identical weak WordPress model or plugin, suggesting that the attackers could also be exploiting weak credentials or utilizing exploits for a number of vulnerabilities.

New payloads

The DoubleDonut Loader was noticed delivering a brand new variant of Vidar Stealer, a widely known infostealer, that makes use of a lifeless drop resolver method to retrieve its command-and-control configuration and dynamic API decision.

Along with Vidar, two beforehand undocumented infostealers have been noticed, one written in .NET and one in C++. Rapid7 has named these new packages Impure Stealer and VodkaStealer and each use detection evasion strategies, together with non-standard knowledge encoding and symmetric encryption for command-and-control communications or sandbox surroundings detection utilizing system and time-based checks.

See also  CyberArk snaps up Zilla Safety for as much as $175M
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular