home.social

#threatlabz — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #threatlabz, aggregated by home.social.

  1. In-Memory Loader Drops ScreenConnect

    Security researcher ThreatLabz discovered an attack chain where attackers used a fake Acrobat Reader download to lure victims into installing ScreenConnect, a remote access tool that can be leveraged for malicious purposes.

    Pulse ID: 69e24c2c6ab3af02c2d7bfbc
    Pulse Link: otx.alienvault.com/pulse/69e24
    Pulse Author: CyberHunter_NL
    Created: 2026-04-17 15:05:16

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #OTX #OpenThreatExchange #ScreenConnect #ThreatLabz #bot #CyberHunter_NL

  2. "🐰 BunnyLoader Unleashed: The Newest Kid on the Malware Block 🐰"

    In a recent discovery, Zscaler ThreatLabz stumbled upon a new Malware-as-a-Service (MaaS) threat named "BunnyLoader" being peddled on various forums. This nefarious service offers a plethora of malicious functionalities including downloading and executing a second-stage payload, pilfering browser credentials and system information, keylogging, and even cryptocurrency theft through clipboard manipulation. 🕵️‍♀️💻

    The malware, written in C/C++, is sold for a lifetime price of $250 and is under rapid development with multiple feature updates and bug fixes. It employs various anti-sandbox techniques during its attack sequence to evade detection and has a fileless loader feature which executes further malware stages in memory. BunnyLoader's C2 panel allows the threat actor to control infected machines remotely, showcasing a list of various tasks including keylogging, credential theft, and remote command execution among others. 🛑🔐

    The detailed technical analysis reveals how BunnyLoader maintains persistence, performs anti-VM techniques, registers with the C2 server, and executes its core malicious tasks. The malware also harbors a clipper module to replace cryptocurrency addresses in a victim's clipboard with addresses controlled by the threat actor, targeting multiple cryptocurrencies like Bitcoin, Ethereum, and Monero. 🪙💸

    The article is a comprehensive dive into the technical intricacies of BunnyLoader, shedding light on its modus operandi and the potential threat it poses to individuals and organizations alike. 🧐🔍

    Source: Zscaler ThreatLabz

    Tags: #BunnyLoader #MalwareAsAService #CyberSecurity #ThreatAnalysis #Malware #CryptocurrencyTheft #Zscaler #ThreatLabz #InfoSec

    Authors: NIRAJ SHIVTARKAR, SATYAM SINGH