网络安全研究人员披露了一项多阶段恶意软件攻击活动,该活动使用批处理脚本作为传播路径,投放XWorm、AsyncRAT和Xeno RAT等加密远程访问木马载荷。攻击链被命名为VOID#GEIST,通过混淆批处理脚本部署第二阶段脚本,植入合法Python运行时,并解密加密的shellcode。现代恶意软件越来越多地转向复杂的基于脚本的传播框架,模仿合法用户活动以规避检测。
A new Python-based malware has been spotted in the wild featuring remote access trojan (RAT) capabilities to give its operators control over the breached systems. Named PY#RATION by researchers at ...
A new campaign tracked as “Dev Popper” is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan (RAT). The developers are ...