An ongoing Zloader campaign utilises a new methodology to disable Microsoft Defender Antivirus. Formerly known as Windows Defender. Microsoft Defender Antivirus is currently running on over a billion instances of Windows 10, according to Microsoft’s own statistics.
The threat actors have begun to utilise various applications such as Discord, TeamViewer and Zoom advertisements on Google Ads, which redirect victims to fake download sites. The victim is then prompted to download a signed MSI installer, which will deliver the Zloader payloads.
More disturbingly, Zloader has also been used recently to deploy Ransomware strains such as Ryuk and Egregor. The malware includes functionality for persistence and remote access. Furthermore, it can be utilised as a dropper for other payloads.
Successful infections can result in a threat actor using the infected host as a foothold, and potentially compromising an entire network. Due to Zloaders capabilities, they can deploy other malware, including ransomware and maintain persistence on the compromised system. Additionally, some Antivirus and EDR products may have a difficult time detecting infections in progress due to the use of a signed MSI and the abuse of legitimate binaries on windows systems.
There is no specific remediation for this malware strain, however, there are steps to take to reduce the likelihood of compromise:
Source: Bleeping Computer
Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…
Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…
It is an undeniable fact that all applications and infrastructures are essentially in need of…