"Researchers Warn of Active Malware Campaign Using HTML Smuggling"
Security researchers at a company called Menlo Security, have uncovered an active malware campaign that utilizes HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies, and firewalls. The new campaign is being called "Duri." The adversary sends victims a malicious link. Once the victim clicks on that link, a JavaScript blob technique is being used to smuggle malicious files via the browser to the user's endpoint (i.e., HTML smuggling). Blobs are "Binary Large Objects." They are responsible for holding data and are implemented by web browsers.
Threatpost reports: "Researchers Warn of Active Malware Campaign Using HTML Smuggling"
Submitted by Anonymous
on