-
The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of a broader set of transformations, making it difficult for analysts to reverse engineer the binary. It introduces ob…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by employing a custom toolset, including a novel IIS backdoor and DNS tunneling protocol. The malware used in this campaig…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶