Threat Research

    We are analyzing a newly identified infection chain linked to the GOLD BLADE cybercriminal group and their custom RedLoader malware, which establishes command and control (C2) communications....
    Analysts are examining a new infection chain linked to the GOLD BLADE cybercriminal group’s custom RedLoader malware, which establishes command and control (C2) communications. The attackers use a LNK file to remotely execute and sideload a benign executable, which then loads the stage 1 RedLoader payload hosted on GOLD BLADE infrastructure....
    Looking for Something?
    Threat Research Categories:
    Tags