A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the wild.
It uses the string 3rd_eye to beacon its presence to the C2 server.
The arrival vector for the malware is presently unknown, although the nature of the lure points to it being used in a phishing campaign.
The very first ThirdEye sample was uploaded to VirusTotal on April 4, 2023.
A notable trait of the malwareis that it uses the .
This addition of SeroXen and BatCloak to the malware arsenal of malicious actors highlights the evolution of FUD obfuscators with a low barrier to entry.
Malicious actors may be adding new types of obfuscators to their arsenals as they discover new ways to gain access to infected hosts.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply