James Webb Telescope Images Loaded With Malware Are Evading EDR

  /     /     /  
Publicated : 23/11/2024   Category : security


James Webb Telescope Images Loaded With Malware Are Evading EDR


New Golang cyberattacks use deep space images and a new obfuscator to target systems — undetected.



Threat hunters are warning security teams to be on the lookout for new cyberattack that uses a chance to see historic James Webb space telescope deep field images as a lure. The campaigns victims are infected with Golang malware. 
Besides the novel lure strategy, the Go programming-based malware gives threat actors added flexibility across platforms and frameworks, in addition to providing reverse-engineering protections and obfuscation benefits, the Securonix research team reported. They dubbed the new
cyberattack chain
GO#WEBFUSCATOR for its ability to get around extended detection and response (EDR) defenses.
The image contains malicious Base64 code disguised as an included certificate, the researchers who found the 
James Webb image-themed cyberattack
explained. At the time of publication, this particular file is undetected by all antivirus vendors according to VirusTotal. 
 

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
James Webb Telescope Images Loaded With Malware Are Evading EDR