'SocGholish' Attack Framework Powers Surge in ... : vimarsan

'SocGholish' Attack Framework Powers Surge in ...


"Because the file is hosted in an iframe within a legitimate site, users are tricked into thinking the file is from a legitimate source and encouraged to download and execute the file," said Krishnan Subramanian, security researcher at Menlo Security, in a research note today.
This iFrame technique helps attackers end around basic web filtering based on website categories since they are delivered from legitimate categories.
The drive-by download mechanisms used by the SocGholish framework don't involve browser exploitations or exploit kits to deliver payloads. Instead, it uses three main techniques. The first is using watering hole attacks by planting iFrames on sites with relatively high Alexa rankings and then sending users through a number of redirects routed through common cloud hosting services until reaching a malicious ZIP file served from an Amazon S3 account.

Related Keywords

Krishnan Subramanian , Ericka Chickowski , Google , Wordpress , Microsoft , Socgholish Attack Framework Powers Surge , Microsoft Teams , Menlo Security , Google Drive , View Full , கிருஷ்ணன் சுப்ரமணியன் , கூகிள் , வேர்ட்பிரஸ் , மைக்ரோசாஃப்ட் , மைக்ரோசாஃப்ட் அணிகள் , மென்லோ பாதுகாப்பு , கூகிள் இயக்கி , பார்வை முழு ,

© 2025 Vimarsana