Source |
CybeReason |
Identifiant |
8308008 |
Date de publication |
2023-02-07 18:17:40 (vue: 2023-02-07 19:08:24) |
Titre |
THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise |
Texte |
The Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader through heavily-obfuscated JavaScript files. In addition to the new techniques used to load GootLoader, Cybereason also observed Cobalt Strike deployment, which leveraged DLL Hijacking, on top of a VLC MediaPlayer executable.
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
addition alert: also cobalt compromise cybereason deployment dll executable files gootloader heavily hijacking incident investigated involved javascript large leading leveraged load mediaplayer methods new obfuscated observed payloads poisoning response seo strike team techniques threat through top used vlc which |
Tags |
Threat
Guideline
|
Stories |
|
Move |
|