"FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"

Researchers at Sekoia found that "FakeBat," a Loader-as-a-Service (LaaS), has become one of the most widely spread loader malware families distributed using the drive-by download technique. According to the company, FakeBat downloads and executes next-stage payloads like "IcedID," "Lumma," "RedLine," "SmokeLoader," "SectopRAT," and "Ursnif." This article continues to discuss the distribution of FakeBat loader malware through drive-by download attacks.

THN reports "FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"

Submitted by grigby1

Submitted by grigby1 CPVI on