G-Data Security Blog

SocGholish: Fake Update Puts Visitors at Risk

The recent developments in SocGholish infection tactics target WordPress-based websites. The attack sequence involves initial access through compromised websites with vulnerable WordPress plugins.

Turla: A Master of Deception

The Turla malware has been found using weaponized LNK files to infect computers. The malware leverages a compromised website to distribute malicious packages through phishing emails.

New JScript-based RAT Uses Cobalt Strike Server for Command & Control

A new JScript-based Remote Access Trojan (RAT) has been discovered, likely distributed through phishing campaigns. The attack involves an initial loader script that contacts a command and control (C&C) server to receive a new malicious script.

GoTo Meeting Software Abused to Deploy Remcos RAT via Rust Shellcode Loader

A recent malware campaign was found exploiting the GoTo Meeting software to deploy the Remcos RAT by using DLL sideloading to execute a malicious DLL file named g2m.dll through a Rust-based shellcode loader.

Sharp Stealer: New Info-stealer Malware Targets Gamers, Crypto Enthusiasts

The malware does not try to hide its presence in the system from antivirus programs and has not gained much popularity in the underground yet, indicating that it is a new player in the market.

Unusual "ZPAQ" Archive Format Delivers Malware

The use of the ZPAQ compression format by threat actors in this malware campaign highlights the need for improved security measures and awareness regarding lesser-known archive tools.

Cybercriminals Run Malicious Ads via Facebook

Criminals are hijacking business accounts on Facebook and running their own advertising campaigns, causing financial damage and reputational harm to legitimate account holders.

Freely-Distributed Ginzo Stealer Malware Pilfers Browser Data, Discord Tokens, and Crypto Wallets

Ginzo stealer is obfuscated with ConfuserEx, resulting in error messages when trying to decompile the code. That is because the type initializer .cctor decrypts the actual code on the fly. It also initializes data required for string decryption.

SteamHide: Hiding Malware in Plain Sight

SteamHide abuses the gaming platform Steam to serve payloads for malware downloaders. Malware operators can also update already infected machines by adding new profile images to Steam.

Look for a fix, get malware instead: examining the Cyrat ransomware

The malware disguises as DLL fixer 2.5. Upon execution, it displays a randomly created number of corrupted DLLs it pretends to have found on the system.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags