Diamond Member ThaHaka 0 Posted Thursday at 11:12 AM Diamond Member Share Posted Thursday at 11:12 AM This is the hidden content, please Sign In or Sign Up A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. "The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation," the AhnLab SEcurity Intelligence Center (ASEC) This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/222846-h4ckn3wscybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now