| mrT4ntr4's Blog
| mrT4ntr4's Blog
In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to "promote", i.e., download and run other malware on the infected machine. According to our observations, most loaders are| 360 Netlab Blog - Network Security Research Lab at 360
This report provides statistics, trends, and case information on the distribution of Infostealer malware, including the distribution volume, methods, and disguises, based on the data collected and analyzed in April 2025. The following is a summary of the report. 1) Data Source and Collection Method The AhnLab SEcurity intelligence Center (ASEC) operates various […]| ASEC
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
在我们的日常botnet分析工作中,碰到各种loader是常事。跟其它种类的malware相比,loader的特殊之处在于它主要用来“推广”,即在被感染机器上下载并运行其它的恶意软件。根据我们的观察,大部分loader是专有的,它们和推广的家族之间存在绑定关系。而少数loader家族会将自己做成通用的推广平台,可以传播其它任意家族,实现所谓的malware-as-a-service(MaaS)。跟专有loader相比...| 360 Netlab Blog - Network Security Research Lab at 360
Agent Tesla is a password stealer spyware that can be used by attackers to spy on victims, allowing them to see everything that has been typed in supported programs and web-browsers. Follow live malware statistics of this stealer and get new reports, samples, IOCs, etc.| Agent Tesla | Malware Trends Tracker