A new version of JSOutProx has been detected by Resecurity. This version is targeting financial services and organizations in the APAC and MENA regions. JSOutProx is a sophisticated attack framework that uses both JavaScript and .NET to carry out its attacks.
The malware allows for the loading of various plugins that carry out additional malicious activities once executed. This malware was first identified in 2019 and was linked to SOLAR SPIDER’s phishing campaigns, distributing the JSOutProx RAT to financial institutions in Africa, the Middle East, South Asia, and Southeast Asia.
Indian Computer Emergency Response Team (CERT-In) issued a high-severity alert for android devices on September 11, 2024 highlighting the vulnerabilities...
By infosecbulletin
/ Wednesday , September 11 2024
In August, Cybersecurity researchers identified 21 new ransomware variants that threaten indivisual and business. Cybercriminals are improving their tactics, making...
By infosecbulletin
/ Wednesday , September 11 2024
Microsoft patched September 2024 Tuesday addressing 79 vulnerabilities, including four actively exploited zero-days which covers critical flaws in Windows Installer,...
On February 8, 2024, a system integration company based in Saudi Arabia reported an incident where customers of a major bank in the region were targeted. Resecurity helped victims by obtaining the malicious code and recovering the payload. On April 2, 2024, there was another attack, where banking customers were tricked with fake notifications and malicious code.
The new version of JSOutProx, along with the use of platforms like GitHub and GitLab, shows that malicious actors are working hard and smart. JSOutProx has been a threat for five years and continues to evolve, especially for financial institutions’ customers. This year, the threat has expanded to the MENA region, increasing their cybercriminal activity. Resecurity is committed to tracking JSOutProx and protecting financial institutions and their customers worldwide from these harmful activities. To read out the full report click here.