Tag: evasion techniques
-
Microsoft Security Blog: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft
Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/ Source: Microsoft Security Blog Title: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft Feedly Summary: Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll…
-
The Register: China’s Silver Fox spoofs medical imaging apps to hijack patients’ computers
Source URL: https://www.theregister.com/2025/02/25/silver_fox_medical_app_backdoor/ Source: The Register Title: China’s Silver Fox spoofs medical imaging apps to hijack patients’ computers Feedly Summary: Sly like a PRC cyberattack A Chinese government-backed group is spoofing legitimate medical software to hijack hospital patients’ computers, infecting them with backdoors, credential-swiping keyloggers, and cryptominers.… AI Summary and Description: Yes Summary: The text…
-
Unit 42: Auto-Color: An Emerging and Evasive Linux Backdoor
Source URL: https://unit42.paloaltonetworks.com/?p=138356 Source: Unit 42 Title: Auto-Color: An Emerging and Evasive Linux Backdoor Feedly Summary: The new Linux malware named Auto-color uses advanced evasion tactics. Discovered by Unit 42, this article cover its installation, evasion features and more. The post Auto-Color: An Emerging and Evasive Linux Backdoor appeared first on Unit 42. AI Summary…
-
Hacker News: Human study on AI spear phishing campaigns
Source URL: https://www.lesswrong.com/posts/GCHyDKfPXa5qsG2cP/human-study-on-ai-spear-phishing-campaigns Source: Hacker News Title: Human study on AI spear phishing campaigns Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a study evaluating the effectiveness of AI models in executing personalized phishing attacks, revealing a disturbing increase in the capabilities of AI-generated spear phishing. The findings indicate high click-through…