A not too long ago uncovered, active campaign called “Duri” makes use of HTML smuggling to supply malware.
An active campaign has been noticed that makes use of HTML smuggling to produce malware, correctly bypassing many network security methods, such as sandboxes, legacy proxies and firewalls.
Krishnan Subramanian, security researcher with Menlo Security, informed Threatpost that the marketing campaign uncovered on Tuesday, dubbed “Duri,” has been ongoing given that July.
Since HTML smuggling is not necessarily a novel method — it is been employed by attackers for awhile, stated Subramanian — this marketing campaign exhibits that terrible actors continue on to depend on older attack methods that are functioning. Understand far more about this most recent attack and how enterprises can defend themselves from HTML-smuggling attacks, all through this week’s Threatpost podcast.
Pay attention to the comprehensive podcast below or download immediate right here.
Also, check out our podcast microsite, exactly where we go beyond the headlines on the hottest information.