Attackers Exploit DLL Hijacking to Bypass SmartScreen - SOC Prime
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Credentials - T1589.001 Malware - T1587.001 Malware - T1588.001 |
Common Information
Type | Value |
---|---|
UUID | d66f45fa-0a3e-4afc-83dc-25b007c8e667 |
Fingerprint | dfb4592cafb1968e |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 11, 2018, 10:02 a.m. |
Added to db | Sept. 26, 2022, 9:31 a.m. |
Last updated | Nov. 8, 2024, 11:37 a.m. |
Headline | Attackers Exploit DLL Hijacking to Bypass SmartScreen |
Title | Attackers Exploit DLL Hijacking to Bypass SmartScreen - SOC Prime |
Detected Hints/Tags/Attributes | 23/2/2 |
Source URLs
URL Provider