Researchers Warn of Active Malware Campaign Using HTML Smuggling
#1
Information 
Quote:A recently uncovered, active campaign called “Duri” makes use of HTML smuggling to deliver malware.
 
An active campaign has been spotted that utilizes HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls.
 
Krishnan Subramanian, security researcher with Menlo Security, told Threatpost that the campaign uncovered on Tuesday, dubbed “Duri,” has been ongoing since July.
 
It works like this: The attackers send victims a malicious link. Once they click on that link, a JavaScript blob technique is being used to smuggle malicious files via the browser to the user’s endpoint (i.e., HTML smuggling). Blobs, which mean “Binary Large Objects” and are responsible for holding data, are implemented by web browsers.
 
Because HTML smuggling is not necessarily a novel technique — it’s been used by attackers for awhile, said Subramanian — this campaign shows that bad actors continue to rely on older attack methods that are working. [...]

Read more: https://threatpost.com/active-malware-ca...ng/158439/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Version 9.6.4 for Windows
Version 9.6.4 for ...harlan4096 — 06:46
AMD confirms focus shifts to RDNA3 and R...
Goodbye Radeon RX ...harlan4096 — 06:45
F-Droid says Google's statement about "S...
A month ago, F-Dro...harlan4096 — 06:44
Google Chrome to enable HTTPS by default...
Google has announc...harlan4096 — 06:41
Revo Registry Cleaner
Revo Registry Cleane...jasonX — 01:51

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>