#Zloader
https://www.zscaler.com/blogs/security-research/inside-zloader-s-latest-trick-dns-tunneling
#ZLoader, a dangerous #malware, has resurfaced with an enhanced anti-analysis feature that prevents it from running on any machine other than the one initially infected.
https://thehackernews.com/2024/05/zloader-malware-evolves-with-anti.html
"🚨 New ZLoader Malware Resurgence: 64-bit Windows Under Threat 🚨"
The cybersecurity community is on alert as ZLoader malware resurfaces with a new variant targeting 64-bit Windows systems. Developed since September 2023, this version presents substantial loader module upgrades, including RSA encryption and an updated domain generation algorithm. Originally an offshoot of the Zeus banking trojan, ZLoader is now a sophisticated loader for various payloads, including ransomware. Despite previous setbacks by Microsoft's Digital Crimes Unit, ZLoader's comeback is marked by increased stealth and complexity, posing a significant threat for future ransomware attacks.
Source: The Hacker News
Tags: #ZLoader #Malware #Cybersecurity #Windows64bit #RSAEncryption #Ransomware #CyberThreat 🌍💻🔐👾
[Breaking Blog]🆕 "From Dawn to "Silent Night": "#DarkSide #Ransomware" Initial Attack Vector Evolution" | Microsoft Exchange
🔥Alliance with #Zloader aka “Silent Night” botnet group
Confirmed:
⭐️Zloader Sub-Botnet ➡️ Cobalt Strike ➡️ DarkSide Ransomware
https://www.advanced-intel.com/post/from-dawn-to-silent-night-darkside-ransomware-initial-attack-vector-evolution
Disclaimer: This is a redacted excerpt of the report published by the subject matter expert team at Advanced Intelligence for the flagship product “Andariel”. DarkSide's affiliate group ascension to the top of the cybercrime food chain was determined by DarkSide's ability to build its initial attack arsenal, which included RDPs, infrastructural vulnerabilities, and, most importantly, a liaison with the Zloader aka "Silent Night" botnet sub-group operation. DarkSide positioned itself as a unique