New IDAT Loader Unleashes Infostealers in Fake Browser Update Campaign
New IDAT Loader Unleashes Infostealers in Fake Browser Update Campaign
Threat Level
Attack Report
For a detailed threat advisory, download the pdf file here
Summary
In a recent malware campaign, threat actors utilized a new IDAT Loader to distribute a range of malicious software, including InfoStealers and RATs, employing evasion methods. This loader is packaged within DLLs and discreetly activated by legitimate applications like VMWarehost, Python, and Windows Defender as part of the Fake Update campaign.
To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.