A new malware family dubbed PrivateLog was found using Common Log File System (CLFS) to stay under the radar and uses another malware—StashLog—as its installer. PRIVATELOG and StashLog have slightly contrasting methods for delivering other malicious payloads. The security agency recommends scanning for IOCs in the events with the keywords ‘process’, ‘imageload’, or ‘filewrite’ in the EDR logs.
- Next story Malware found pre-installed in cheap push-button mobile phones sold in Russia
- Previous story We Could Start Seeing Some Hurricane Ida-related Investment Scams
Popular Tags
Attack (594)
attacks (556)
computer security (768)
cyber attacks (769)
cyber news (822)
Cybersecurity (1443)
cyber security news (822)
cyber security news today (822)
cyber security updates (822)
cyber updates (822)
Data (752)
data breach (828)
ethical hacking (902)
hack android (902)
hack app (902)
hacker news (1663)
Hackers (526)
hacking (1225)
hacking news (761)
hacking tools for windows (902)
hack wordpress (902)
how to hack (761)
information security (785)
keylogger (904)
kit (910)
kitploit (902)
Malware (811)
network security (768)
password brute force (902)
penetration testing (904)
pentest (906)
pentest android (902)
pentest linux (902)
pentest toolkit (902)
pentest tools (902)
Phishing (469)
Ransomware (1080)
ransomware malware (761)
security (1196)
software vulnerability (761)
spy tool kit (902)
spyware (959)
the hacker news (762)
tools (957)
vulnerabilities (508)
Best Articles