URL has been copied successfully!
Hackers Exploit COM Objects for Fileless Malware and Lateral Movement
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object Model (COM) objects in Windows systems. This method, based on research by James Forshaw of Google Project Zero, allows attackers to execute .NET managed code in the context of a server-side Distributed COM (DCOM) process. […] The post Hackers Exploit COM Objects for Fileless Malware and Lateral Movement appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

First seen on gbhackers.com

Jump to article: gbhackers.com/hackers-exploit-com-objects-for-fileless-malware/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link