logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Organizations Urged to Address Critical Vulnerabilities Found in First Half of 2023
  • Analyzing the FUD Malware Obfuscation Engine BatCloak
  • Google changes email authentication after spoof shows a bad delivery for UPS
  • Employee cybersecurity awareness takes center stage in defense strategies
  • IoT Botnet DDoS Attacks Threaten Global Telecom Networks, Nokia

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-20749 (android) 6 June 2023
  • CVE-2023-20752 (android) 6 June 2023
  • CVE-2023-20750 (android) 6 June 2023
  • CVE-2023-20751 (android) 6 June 2023
  • CVE-2023-20745 (android, iot-yocto, yocto) 6 June 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Heavily Obfuscated Malware Campaign using Weaponized PowerPoint Files to Drop Lokibot & Azorult

Posted on 11 January 2020

From cybersecuritynews.com

PowerPoint Malware

A new malware campaign utilizes PowerPoint files to deliver the Lokibot info stealer or Azorult remote access trojan.

Security researchers from Appriver spotted the malware campaign that includes weaponized PowerPoint files.

Read more…

Posted in News

Post navigation

Previous post: Cable Haunt – Critical Vulnerability Let Hackers Control Cable Modems Remotely
Next post: Karonte – A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.