new-malware-loaders-use-call-stack-spoofing,-github-c2,-and.net-reactor-for-stealth

Cybersecurity analysts have identified a revised iteration of a malware loader known as Hijack Loader that incorporates additional functionalities to avoid detection and maintain persistence on affected systems.
“Hijack Loader has introduced a fresh module that employs call stack obfuscation to conceal the source of function invocations (for instance, API and system calls),” stated Zscaler ThreatLabz analyst Muhammed Irfan V A in


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This