Two different payloads are hiding in audio files, each paired with one of three loaders. Audio .WAV files are the latest hiding place for obfuscated malicious code; a campaign has been spotted in ...
Decoding the methods in malicious code is becoming more difficult, according to reverse-engineering experts. Attacks no longer scramble simple function names, but encrypt entire blocks of code.
Threat analysts have discovered a new obfuscation technique used by the Hive ransomware gang, which involves IPv4 addresses and a series of conversions that eventually lead to downloading a Cobalt ...
Since last fall, well-known backdoor malware SmokeLoader has been upgraded with a new second-stage payload dropper called CoffeeLoader that's tricked out with techniques to beat endpoint security ...
Security researchers Zscaler found a new loader used in different infostealing campaigns CoffeeLoader uses multiple tricks to bypass security and drop additional payloads Interestingly enough, it ...