4 links
tagged with all of: malware + obfuscation
Click any tag below to further narrow down your results
Links
Nearly 270,000 websites have fallen victim to malicious JavaScript injections using a unique obfuscation technique called "JSF-ck." This method encodes JavaScript using only six ASCII characters, allowing attackers to redirect users or display harmful content through iframes. Security experts emphasize the importance of keeping web servers updated and monitoring for signs of compromise.
A recent threat research report highlights three malicious Go modules that use obfuscation techniques to deliver destructive payloads capable of wiping entire disks. These modules exploit the open nature of the Go ecosystem, allowing attackers to masquerade as legitimate libraries, leading to irreversible data loss for unsuspecting developers.
A sophisticated npm attack employs over seven layers of obfuscation to distribute the Pulsar Remote Administration Tool (RAT). The obfuscation techniques include the use of Japanese Unicode characters, hexadecimal encoding, array shuffling, binary array encoding, and even image steganography to conceal malicious code within a PNG image. The malicious npm package remains publicly available, highlighting ongoing cybersecurity risks.
Jamf Threat Labs has identified a new technique where attackers use PyInstaller to bundle Python-based infostealers into Mach-O executables on macOS. This method allows malware to run without requiring a native Python installation, while employing various obfuscation tactics to evade detection. The analysis includes dynamic and static examination of these malicious binaries, revealing behaviors consistent with infostealer activity.