DiscoverCYFIRMA ResearchCYFIRMA Research: JavaScript to Command-and-Control (C2) Server Malware
CYFIRMA Research: JavaScript to Command-and-Control (C2) Server Malware

CYFIRMA Research: JavaScript to Command-and-Control (C2) Server Malware

Update: 2025-02-14
Share

Description

The cyber threat landscape is evolving, with hackers deploying multi-stage malware using obfuscation, steganography, and covert communication channels to evade detection.

Attacks start with an Obfuscated JavaScript, fetching encoded commands from a URL and executing an obfuscated PowerShell script, downloading a JPG image and obfuscated text file concealing malicious MZ DOS executables. The Stealer malware is then deployed, extracting passwords, browser data, and system info. The stolen data is subsequently sent to the attackers via Telegram bots, bypassing traditional security.

Stay Safe! Avoid running unknown scripts & suspicious downloads.

Link to the Research Report: https://www.cyfirma.com/research/javascript-to-command-and-control-c2-server-malware/

#Cybersecurity #MalwareAlert #StaySafe #ProtectYourData #CYFIRMA #CyfirmaResearch #ExternalThreatLandscapeManagement #ETLM

https://www.cyfirma.com/

Comments 
loading
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

CYFIRMA Research: JavaScript to Command-and-Control (C2) Server Malware

CYFIRMA Research: JavaScript to Command-and-Control (C2) Server Malware

CYFIRMA