Warning: Attempt to read property "content" on null in /var/www/html/teck-global.com/wp-content/plugins/gutenverse/lib/framework/helper.php on line 730

Warning: Attempt to read property "content" on null in /var/www/html/teck-global.com/wp-content/plugins/gutenverse/lib/framework/helper.php on line 730

Deprecated: preg_match(): Passing null to parameter #2 ($subject) of type string is deprecated in /var/www/html/teck-global.com/wp-includes/class-wp-block-parser.php on line 247

Deprecated: strlen(): Passing null to parameter #1 ($string) of type string is deprecated in /var/www/html/teck-global.com/wp-includes/class-wp-block-parser.php on line 324
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection - O'Fallon IL Computer Support
Template part has been deleted or is unavailable: teck-global-llc-main-header-v1-1

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

Computer Security

,

Hacker Security

A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77.
The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to establish persistence and evade detection on compromised systems. It’s currently not known who is behind the campaign.
The rootkit “has the ability to cloak or mask any file, registry key or task

Leave a Reply

Your email address will not be published. Required fields are marked *