Recently, Hancitor incorporated the use of COM to spawn IE and download stage 2 payloads. While many may have not understood the true risk of what the Hancitor campaign stumbled into it, its very dangerous.
dodgethissecurity.com/2019/11/01/han…
Keep Current with Dodge This Security
This Thread may be Removed Anytime!
Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!
1) Follow Thread Reader App on Twitter so you can easily mention us!
2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll"
@threadreaderapp unroll
You can practice here first or read more on our help page!