![]() When the victims opened the fake job offers, they unknowingly initiated the surreptitious installation of the fileless backdoor “more_eggs”. LinkedIn candidates received malicious ZIP archive files with the name of the victims’ job titles on their LinkedIn profiles. Less than a month ago, a new spear-phishing campaign started to target professionals on LinkedIn with a sophisticated backdoor trojan called "more_eggs" concealed in a job offer. Threat actors leverage this tactic to insert hard-to-detect malware into shortcut files (LNK files), manipulating a reliable application into becoming a perilous threat. The more discreet the malware, the harder it is to detect and remove. ![]() ![]() How malware can be hidden in LNK files and how organizations can protect themselves.Ĭybercriminals are always looking for innovative techniques to attack security defenses. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |