Obfuscation

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

7 months ago

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to recognize and easily bypasses the Endpoint…

1 year ago

Hackers Launching Ursnif Malware via Weaponized office Document Using Steganography Technique

Cyber Criminals now distributing powerful ursnif malware via malicious Office Documents with multi-stage highly obfuscated PowerShell scripts to bypass security…

6 years ago

Hackers Now Launching Powerful Weaponized PDF Exploit using Steganography Technique

Cyber Criminals now using new Stenography technique to distribute a powerful Obfuscated PDF exploit in order to compromise the targets…

6 years ago

Java Malware “jRAT” Evolving with Highly Obfuscation Patterns

Java Based Remote Access Trojan Called "jRAT" Rapidly Evolving with Advanced Capabilities and Targeting Many Organization Sensitive information that spreading…

8 years ago