Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

BatCloak: the new malware invisible to antiviruses

In the digital criminal underground, BatCloak emerges as an essential tool for obfuscating malicious code

This pill is also available in Italian language

Since September 2022, a new malware named BatCloak has attracted the attention of cybercriminals for its advanced obfuscation features, making it virtually undetectable by traditional antivirus solutions. BatCloak is distinguished by its ability to transform malicious code into "evasive" versions, making them virtually invisible to major security software. Cybersecurity analyst Pierluigi Paganini, CEO of Cybhorus, explains how malware obfuscation engines like BatCloak have become key components in malware development.

A widespread and multifaceted threat

According to Trend Micro experts, BatCloak allows cybercriminals to upload different families of malware and exploits through obfuscated batch files, greatly facilitating the distribution of threats. Paganini points out that in the underworld of digital crime, obfuscation engines like BatCloak are becoming essential tools for successful malware campaigns.

The problem of detection and the evolution of computer crime

Incredibly, 79.6% of the 784 samples analyzed go undetected by traditional security solutions, underlining BatCloak's effectiveness in bypassing detection mechanisms. Paganini highlights the growth of the market that develops around these software, highlighting the importance of responding to this threat. Furthermore, the expert predicts that the increased demand for these tools will lead to the development of new obfuscation engines, enhancing the evasion capacity of existing malware.

Mitigating risk: defense strategies

In the context of this growing threat, the need for constant security program updates becomes critical. It is essential to integrate the new indicators of compromise released by researchers and stay abreast of increasingly sophisticated attack techniques. For example, ScrubCrypt, a malware born from the transition from an open-source framework to a closed-source model, is designed to work with well-known malware families such as Amadey, AsyncRAT, DarkCrystal RAT, Pure Miner, Quasar RAT, RedLine Stealer, Remcos RAT , SmokeLoader, VenomRAT and Warzone RAT. The search also detects IP addresses, URLs used to spread payloads, hashes of compromised files, and commonly used file names, providing valuable tools for mitigating risk.

Follow us on Instagram for more pills like this

06/13/2023 16:52

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated