A short-lived malvertising campaign leveraged a steganography-based payload to target Mac users with the Shlayer trojan. Named for its use of veryield-malyst[dot]com as one of its ad-serving domains, the “VeryMal” threat actor conducted its malvertising campaign between 11 January 2019 and 13 January 2019. That’s not a long time period to remain active. But the […]… Read More
The post Malvertising Campaign Used Steganography to Distribute Shlayer Trojan appeared first on The State of Security.
from The State of Security http://bit.ly/2R8DDag
via https://ifttt.com/ IFTTT
No comments:
Post a Comment