cybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives

A malicious software operation deploying the XLoader malware has been detected employing the DLL side-loading method by utilizing a genuine application connected to the Eclipse Foundation.
“The authentic application exploited in the assault, jarsigner, is a file generated during the setup of the IDE package provided by the Eclipse Foundation,” the AhnLab Security Intelligence Center (ASEC)


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This