IBM X factor researchers detected an uptick in HawkEye version 9 keylogger infection campaigns targeting business users around the world and threat actors offering the malware as a service.

The malware is designed to steal information from infected devices as well as to download additional malware by leveraging it botnets to distribute malware as a service as unique commercial offerings to third party threat actors, according to a May 27 blog post.

Hawkeye’s infection process is based on a number of executable files that leverage malicious PowerShell scripts

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.