back to article ViperSoftX variant spotted abusing .NET runtime to disguise data theft

A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix. ViperSoftX, first spotted in 2020, has recently reemerged with the ability to use the .NET Common Language Runtime (CLR) to obfuscate its use of PowerShell …

  1. ChoHag Silver badge

    > ViperSoftX's capabilities suggest a new wave of sophisticated and agile malware threats is breaking.

    The attackers have learned shell scripting?

    1. Irongut Silver badge

      I'm always amused by security researchers, they seem to think anything beyond turning on a computer is sophisticated or requires being a government employee.

      1. FILE_ID.DIZ
        Boffin

        I think the point being made here is that regular powershell auditing and logging that enterprises do by sifting continuously through PS Module Logging, PS Script Block Logging and PS Transcription data streams could be thwarted with this technique.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like