A new malware campaign is using a DLL side-loading technique to distribute the XLoader malware through a legitimate tool called jarsigner.exe, which is part of the Eclipse Foundation’s IDE package. Cybercriminals are placing malicious DLL files alongside the legitimate executable, ensuring their execution when the application runs. This method allows the malware to evade detection.
Juniper Threat Labs discovered a new JavaScript obfuscation technique used in phishing attacks targeting affiliates of a major American political action committee (PAC) in early January 2025. The attack uses an invisible obfuscation technique. Check Point researchers have discovered an extremely sophisticated attack, perpetrated by nation state threat actors, that targeted the CEO and a high-ranking employee of a well-known organization.