News

The threat landscape constantly evolves, and with it, so do the strategies of malicious actors. The advent of the Matanbuchus ...
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
Morphisec said on Wednesday that a new version of the Matanbuchus malware loader is being distributed by phishing through ...
Researchers from Morphisec spotted Matanbuchus 3.0 in the wild The malware serves as a loader for Cobalt Strike or ransomware ...
The ClickFix campaign is targeting users with fake Google Meet errors and attempting to plant info-stealers posing as a fix.
These further cause malware like DarkGate or Matanbuchus to infect the devices. The option of "How to Fix" urges the user to copy a PowerShell command and paste it into PowerShell.
IT security researchers at Proofpoint have discovered a new attack method in which attackers use social engineering and the clipboard.
The MSI file, when executed, installs Matanbuchus, another malware loader, while the VBS file downloads and run the DarkGate attack code. "Proofpoint assesses with high confidence that TA571 ...
They observed the threat actor labeled TA571 and others delivering malware such as DarkGate, Matanbuchus, NetSupport, and various information stealers. The campaign usually begins via spam attacks or ...
Proofpoint spotted payloads such as Matanbuchus, DarkGate, NetSupport, XM Rig, Amadey Loader, a clipboard hijacker, and Lumma Stealer.