New IDAT Loader Unleashes Infostealers in Fake Browser Update Campaign

Threat Advisories

New IDAT Loader Unleashes Infostealers in Fake Browser Update Campaign

Threat Level
Attack Report

For a detailed threat advisory, download the pdf file here

Summary

In a recent malware campaign, threat actors utilized a new IDAT Loader to distribute a range of malicious software, including InfoStealers and RATs, employing evasion methods. This loader is packaged within DLLs and discreetly activated by legitimate applications like VMWarehost, Python, and Windows Defender as part of the Fake Update campaign.

To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.