cognitive cybersecurity intelligence

News and Analysis

Search

CoffeeLoader: A Brew of Stealthy Techniques

Security researchers have identified a sophisticated malware named CoffeeLoader, designed to download and execute additional payloads while evading security detection. The malware uses techniques including call stack spoofing and sleep obfuscation to bypass protection. CoffeeLoader, distributed via another malware family, SmokeLoader, also uses a packer named Armoury that executes code on a system’s GPU to hinder analysis in virtual environments.

Source: securityboulevard.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

What are business logic vulnerabilities?

Business logic vulnerabilities in software allow attackers to exploit flaws in design, enabling them to circumvent security measures and manipulate pricing, authentication, and other key