logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks
  • Unknown actors deploy malware to steal data in occupied regions of Ukraine
  • Ransomware Attacks Double in Europe’s Transport Sector
  • BreachForums shuts down … but the RaidForums cybercrime universe will likely spawn a trilogy
  • Snipping Tool Windows 11: Bug exposes image content

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-27707 (dedecms) 16 March 2023
  • CVE-2023-27037 (qibocms) 16 March 2023
  • CVE-2021-31637 (uwamp) 16 March 2023
  • CVE-2023-26768 (liblouis) 16 March 2023
  • CVE-2023-26769 (liblouis) 16 March 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Malware Loaders Opt for API Hammering to Evade Detection

Posted on 28 June 2022

From cyware.com

Malware Loaders Opt for API Hammering to Evade Detection

Sandboxing is a popular cybersecurity practice that provides a safe environment to observe and analyze if a sample is malicious. However, malware loaders are lately leveraging a lesser-known and unique tactic to bypass sandbox environments and execute malicious payloads onto the systems.

Read more…

Posted in News

Post navigation

Previous post: New Android Banking Trojan ‘Revive’ Targeting Users of Spanish Financial Services
Next post: Automotive fabric supplier TB Kawashima announces cyberattack
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.