February 7th, 2018 By Bradley Barth
Despite its relatively small pool of viable targets, the malicious Windows-based downloader Hancitor continues to surface in malspam campaigns that recently have relied heavily on distribution servers set up via fraudulent hosting provider accounts, a new blog post report states.
Researchers at Palo Alto Networks’ Unit 42 threat intelligence team reported in a Feb. 7 blog post that they continue to detect several hundred samples of Hancitor per month, typically with large spikes of activity in the middle of the typical Monday-Friday work week. The numbers indicate that adversaries still find the malware to be viable, even though up-to-date versions of Windows would typically catch it, the post states.
Powered by WPeMatico