An open-source command-and-control (C2) framework called Mythic is being distributed by SocGholish infection chains using an upgraded version of a malware loader known as BLISTER.
Salim Bitam and Daniel Stepanic, researchers at Elastic Security Labs, wrote about the new BLISTER upgrade in a technical study that was released late last month. “New BLISTER update includes keying feature that allows for precise targeting of victim networks and lowers exposure within VM/sandbox environments,” they claimed.
The business discovered BLISTER for the first time in December 2021 while it was being used as a conduit to spread Cobalt Strike and BitRAT payloads on compromised systems.
Palo Alto Networks Unit 42 first revealed the use of the virus to deploy Mythic read more New BLISTER Malware Update Fuelling Stealthy Network Infiltration.
Stay informed with the best cybersecurity news and raise your cybersecurity awareness with our comprehensive coverage of the latest threats, breaches, and solutions.