Tag : stealthy

3 attack reports | 0 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
The Abuse of ITarian RMM by Dolphin Loader Aug. 19, 2024, 1:24 p.m. This report explores how the Dolphin Loader, a malware-as-a-service loader, abuses the legitimate ITarian Remote Monitoring and M… 24
DBatLoader Distributed via CMD Files June 27, 2024, 9:26 a.m. A cybersecurity analysis has identified a malicious operation involving the distribution of a downloader, dubbed DBatLoader or Mo… 0
Operation ControlPlug: Targeted attack campaign using MSC files June 6, 2024, 2:55 p.m. An investigation revealed that the threat group DarkPeony, also known as Operation ControlPlug, employed a novel technique involv… 14