Tag: hijacking
2 attack reports | 0 vulnerabilities
Attack reports
New Widespread Extension Trojan Malware Campaign
This report discusses a widespread polymorphic malware campaign that forcefully installs malicious browser extensions on endpoints. The malware, originating from imitations of download websites, delivers various malicious payloads, including adware extensions, data stealing scripts, and commands to…
Downloadable IOCs 0
Eight Arms to Hold You: The Cuttlefish Malware
The Black Lotus Labs team at Lumen Technologies is tracking a malware platform named Cuttlefish, targeting enterprise-grade small office/home office (SOHO) routers. This modular malware primarily steals authentication material from web requests transiting the router. It can also perform DNS and HTT…
Downloadable IOCs 40
New Widespread Extension Trojan Malware Campaign
This report discusses a widespread polymorphic malware campaign that forcefully installs malicious browser extensions on endpoints. The malware, originating from imitations of download websites, delivers various malicious payloads, including adware extensions, data stealing scripts, and commands to…
Downloadable IOCs 0
Eight Arms to Hold You: The Cuttlefish Malware
The Black Lotus Labs team at Lumen Technologies is tracking a malware platform named Cuttlefish, targeting enterprise-grade small office/home office (SOHO) routers. This modular malware primarily steals authentication material from web requests transiting the router. It can also perform DNS and HTT…
Downloadable IOCs 40