Sekoia.io’s Post

View organization page for Sekoia.io, graphic

15,121 followers

Have you ever heard about “FakeBat”? 👀 🔎 It’s a loader malware in MSI format that offers “several anti-detection features, such as bypassing the Unwanted Software Policy of Google and Windows Defender alerts and being protected from VirusTotal”. 📈 During the first semester of 2024, #FakeBat was one of the most widespread loaders using the drive-by download technique. It’s commonly used to distribute loaders such as #IcedID, #Lumma, #Redline, SmokeLoader, SectopRAT…🚨 📝 In our new report, Sekoia Threat Detection & Research (TDR) team present the activities of the FakeBat operators, an analysis of previously undocumented campaigns distributing FakeBat. 🔐Additionally, IoCs, YARA rules and tracking heuristics to monitor the FakeBat distribution and C2 infrastructures are also available at the end of the report. 💡To read the report, click here: https://lnkd.in/eyCTr3pr

Exposing FakeBat loader: distribution methods and adversary infrastructure

Exposing FakeBat loader: distribution methods and adversary infrastructure

blog.sekoia.io

To view or add a comment, sign in

Explore topics