vimarsana.com

Latest Breaking News On - Microsoft build engine - Page 1 : vimarsana.com

Russia s Turla APT Abuses MSBuild to Deliver TinyTurla Backdoor

A threat campaign luring users with malicious documents related to human rights and public notices is aimed at giving the Russia-backed threat group access to victims' systems for cyber-espionage purposes.

Microsoft releases NET 8 for Windows, Mac, and Linux

Hackers use open source Microsoft dev platform to deliver trojans

The files delivered contained encoded executables and shellcode some were hosted on Russian image-hosting site, “joxi[.]net.” While researchers couldn’t determine the distribution method of the .proj files, these files’ objective was to execute either Remcos or RedLine Stealer. Most of the malware analyzed delivered Remcos as the final payload. Once installed on the victim’s computer, the Remcos trojan allows hackers to remote control, remote admin, remote anti-theft, remote support, and pentest a machine. Related Resource Cyber resilience for dummies While Remcos is commercial software created by Breaking Security, hackers often use it for malicious purposes. Researchers said the software enables full access to the infected machine with features like anti-AV, credential harvesting, gathering system information, keylogging, persistence, screen capture, script execution, and more.

Attackers abuse Microsoft dev tool to deploy Windows malware

Attackers abuse Microsoft dev tool to deploy Windows malware By 01:00 PM Threat actors are abusing the Microsoft Build Engine (MSBuild) to deploy remote access tools (RATs) and information-stealing malware filelessly as part of an ongoing campaign. MSBuild (msbuild.exe) is a legitimate and open-source Microsoft development platform, similar to the Unix make utility, for building applications. This development tool can build apps on any Windows system if provided with an XML schema project file telling it how to automate the build process (compilation, packaging, testing, and deployment.) As Anomali s Threat Research team observed, the malicious MSBuild project files delivered in this campaign bundled encoded executables and shellcode the threat actors used for injecting the final payloads into the memory of newly spawned processes.

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.