[[{“value”:”The loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal.
“FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif,” the company said in a Tuesday analysis.
Drive-by attacks”}]] Read More
![From The Hacker News – FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMv3BzA7GmnnloseKlNcPn5oFH9kg1L8PKXPTATG4agdfp1QgWViFuoNqKxhuQy8IX4x6fPdX-IRu1LuSRbWH0kcekdcBbUI-D72vJIkRgHVQ2qLpJWVtdK9fiaCGmQdS5F7GqaEOck30YHam3eXhekW67jjR-nWcjwfxrWzawh94NGZii2oSFN34Ki7Tz/s1600/anudesk.png)
Posted inNews