RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary
After loading a vulnerable driver, the utility uses a public exploit to gain privilege escalation and the ability to disable endpoint protection software.
Key takeaways Introduction In the shadowy world of cybercrime, even the most cunning hackers can make blunders that expose their operations. In this article CPR describes the discovery of Styx Stealer, a new malware variant derived from the notorious Phemedrone Stealer. Our investigation revealed critical missteps by the developer of Styx Stealer, including a significant […]
The post Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove appeared first on Check Point Research.