New PRIVATELOG Malware Uses CLFS Log Files to Hide

A new malware family dubbed PrivateLog was found using Common Log File System (CLFS) to stay under the radar and uses another malware—StashLog—as its installer. PRIVATELOG and StashLog have slightly contrasting methods for delivering other malicious payloads. The security agency recommends scanning for IOCs in the events with the keywords ‘process’, ‘imageload’, or ‘filewrite’ in the EDR logs.

click here to read full Article

Read more on Malware updates & News

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *