Researchers have observed a new malware campaign that's been targeting the U.S., Argentina, Brazil and Costa Rica with an updated variant of the Loda RAT remote access trojan.
In a company blog post on Wednesday, Cisco Talos said that since at least the last quarter of 2019, the campaign has been using malicious websites to host malicious documents that are used in a multi-step infection chain designed to bypass email filters and deliver Loda version 1.1.1.
This new version of Loda functions similarly to previous iterations, but with a few notable differences, states Talos. Changes including a new form a string encoding for obfuscation, multiple persistence mechanisms to help the malware survive reboots, and the leveraging of Windows Management Instrumentation (WMI) to list out antivirus solutions running on the victim machine. Due to the campaign's obfuscation techniques, detection rates have so far been low, the blog post adds.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.