New BLISTER Malware Using Code Signing Certificates to Evade DetectionThe Hacker News

Torna a Articoli

New BLISTER Malware Using Code Signing Certificates to Evade DetectionThe Hacker News

Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security defenses and stay under the radar with the goal of deploying Cobalt Strike and BitRAT payloads on compromised systems.
The binary, a loader, has been dubbed “Blister” by researchers from Elastic Security, with the malware samples having Read More

Condividi questo post

Torna a Articoli
Generated by Feedzy