Recent Malicious Loaders Employ Call Stack Spoofing, GitHub C2, and .NET Reactor for Camouflage
A team of experts in cybersecurity has unearthed a revised edition of a malicious loader known as Hijack Loader that incorporates fresh capabilities to avoid identification and establish continuity on infiltrated networks.
“In its latest update, Hijack Loader introduced a novel component that utilizes call stack spoofing to conceal the source of function calls (such as API and system calls),” shared Muhammed Irfan V A, a researcher from Zscaler ThreatLabz.
“In its latest update, Hijack Loader introduced a novel component that utilizes call stack spoofing to conceal the source of function calls (such as API and system calls),” shared Muhammed Irfan V A, a researcher from Zscaler ThreatLabz.
