CYFIRMA Research

CYFIRMA Research: JavaScript to Command-and-Control (C2) Server Malware

CYFIRMA

The cyber threat landscape is evolving, with hackers deploying multi-stage malware using obfuscation, steganography, and covert communication channels to evade detection.

Attacks start with an Obfuscated JavaScript, fetching encoded commands from a URL and executing an obfuscated PowerShell script, downloading a JPG image and obfuscated text file concealing malicious MZ DOS executables. The Stealer malware is then deployed, extracting passwords, browser data, and system info. The stolen data is subsequently sent to the attackers via Telegram bots, bypassing traditional security.

Stay Safe! Avoid running unknown scripts & suspicious downloads.

Link to the Research Report: https://www.cyfirma.com/research/javascript-to-command-and-control-c2-server-malware/

#Cybersecurity #MalwareAlert #StaySafe #ProtectYourData #CYFIRMA #CyfirmaResearch #ExternalThreatLandscapeManagement #ETLM

https://www.cyfirma.com/