Recent Malicious Loaders Employ Call Stack Spoofing, GitHub C2, and .NET Reactor for Camouflage

A team of experts in cybersecurity has unearthed a revised edition of a malicious loader known as Hijack Loader that incorporates fresh capabilities to avoid identification and establish continuity on infiltrated networks.

A team of experts in cybersecurity has unearthed a revised edition of a malicious loader known as Hijack Loader that incorporates fresh capabilities to avoid identification and establish continuity on infiltrated networks.
“In its latest update, Hijack Loader introduced a novel component that utilizes call stack spoofing to conceal the source of function calls (such as API and system calls),” shared Muhammed Irfan V A, a researcher from Zscaler ThreatLabz.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.