Tag : darkgate

9 attack reports | 0 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
Disarming DarkGate: A Deep Dive into Thwarting the Latest DarkGate Variant July 15, 2024, 3:14 p.m. This report analyzes a recent phishing campaign distributing a new DarkGate Remote Access Trojan variant. The malware leverages v… 4
A Social Engineering Tactic to Deploy Malware July 15, 2024, 3:12 p.m. McAfee Labs uncovered a sophisticated social engineering technique, dubbed 'ClickFix,' for deploying malware such as DarkGate and… 7
DarkGate: Dancing the Samba With Alluring Excel Files July 11, 2024, 11:56 a.m. This analysis delves into a DarkGate malware campaign from March-April 2024 that exploits Microsoft Excel files to retrieve malic… 37
From Clipboard to Compromise: A PowerShell Self-Pwn June 17, 2024, 11:23 a.m. This intelligence report details a unique social engineering technique observed by Proofpoint researchers, leveraging users to co… 14
DarkGate again but... Improved? June 6, 2024, 8:16 a.m. The report details the latest developments surrounding the DarkGate remote access trojan, including its enhanced capabilities in … 313
DarkGate switches up its tactics with new payload, email templates June 6, 2024, 7:26 a.m. This analysis delves into a recent surge of malicious email campaigns by the DarkGate threat actor, employing novel tactics to di… 12
Warning Against Phishing Emails Prompting Execution of Commands via Paste June 6, 2024, 7:18 a.m. This report details a phishing campaign distributing malicious HTML files through emails. The files prompt users to paste and run… 15
From Document to Script: Insides of Campaign May 17, 2024, 9:38 a.m. This report examines a recent malicious campaign initiated via phishing emails, seemingly from 'QuickBooks,' prompting users to i… 11
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen April 30, 2024, 2:13 p.m. This report details a novel infection chain associated with DarkGate malware, a Remote Access Trojan (RAT) that exploits the Auto… 15