"FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"
Researchers at Sekoia found that "FakeBat," a Loader-as-a-Service (LaaS), has become one of the most widely spread loader malware families distributed using the drive-by download technique. According to the company, FakeBat downloads and executes next-stage payloads like "IcedID," "Lumma," "RedLine," "SmokeLoader," "SectopRAT," and "Ursnif." This article continues to discuss the distribution of FakeBat loader malware through drive-by download attacks.
THN reports "FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"
Submitted by grigby1
Submitted by Gregory Rigby
on