FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks,
The loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal.
« FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif, » the company said in a Tuesday analysis.
Drive-by attacks
« FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif, » the company said in a Tuesday analysis.
Drive-by attacks
,
The loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal.
« FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif, » the company said in a Tuesday analysis.
Drive-by attacks
« FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif, » the company said in a Tuesday analysis.
Drive-by attacks
, ,
https://thehackernews.com/2024/07/fakebat-loader-malware-spreads-widely.html