[HackerNews] This New Malware Family Using CLFS Log Files to Avoid Detection

Cybersecurity researchers have disclosed details about a new malware family that relies on the Common Log File System (CLFS) to hide a second-stage payload in registry transaction files in an attempt to evade detection mechanisms.
FireEye’s Mandiant Advanced Practices team, which made the discovery, dubbed the malware PRIVATELOG, and its installer, STASHLOG. Specifics about the identities of the

Source: Read More (The Hacker News)

You might be interested in …

[ThreatPost] SonicWall Warns Firewall Hardware Bugs Under Attack

All posts, ThreatPost

SonicWall issued an urgent security alert warning customers that some of its current and legacy firewall appliances were under active attack. Source: Read More (Threatpost)

Read More

[ThreatPost] TeaBot Trojan Targets Banks via Hijacked Android Handsets

All posts, ThreatPost

Malware first observed in Italy can steal victims’ credentials and SMS messages as well as livestream device screens on demand. Source: Read More (Threatpost)

Read More

[TheRecord] Spyware features found in Chinese state benefits app

Spyware-like features have been discovered inside an app named “Beijing One Pass” that foreign companies operating in China are forced to install on their systems in order to access a digital platform to manage employee state benefits. The post Spyware features found in Chinese state benefits app appeared first on The Record by Recorded Future. […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.