FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
Wednesday, 3 July 2024
Add Comment
The loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal. "FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif," the company said in a Tuesday analysis. Drive-by attacks
from The Hacker News https://ift.tt/3LOsCIg
Genrerating Link.... 15 seconds.
Your Link is Ready.
0 Response to "FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"
Post a Comment