“Microsoft hasn’t given up on securing the admin-to-kernel boundary, though,” researchers from Avast explain. “Quite the opposite. It has made a great deal of…
Lazarus
-
-
One of the DLang-based implants deployed in the post-exploitation stage is dubbed NineRAT and is a RAT that uses Telegram as a command-and-control (C2)…
-
Neither of the two trojans have graphical user interfaces so the choice of using Qt for development might seem strange. However, because there are…
-
Usually, when attackers find a web server with a vulnerable version from scanning, they use the vulnerability suitable for the version to install a…
-
Lazarus group was spotted exploiting flaws in unnamed software to gain access to a South Korean finance firm twice last year. The North Korea-linked…
-
MalwareNewsSecurity
North Korea’s Lazarus group uses vulnerable Dell driver to blind security solutions
The notorious North Korean state-sponsored hacker group Lazarus has begun exploiting a known vulnerability in an OEM driver developed by Dell to evade detection…
- 1
- 2