Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis (Microsoft)

Discussion in 'malware problems & news' started by ronjor, Jul 11, 2018.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,926
    Location:
    Texas
    July 11, 2018 Office 365 Threat Research
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    What's interesting to note is that it injects its code into MSBuild.exe, RegAsm.exe, and VBC.exe, but if you block these tools from network access, then how will the Hawkeye keylogger connect out?
     
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Threat Actors Exploit Equation Editor to Distribute Hawkeye Keylogger
    https://securityintelligence.com/ne...ation-editor-to-distribute-hawkeye-keylogger/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.