A multi-stage malware loader known as OysterLoader has continued to evolve into early 2026, refining its command-and-control (C2) infrastructure and obfuscation methods.
Threat analysts have discovered a new obfuscation technique used by the Hive ransomware gang, which involves IPv4 addresses and a series of conversions that eventually lead to downloading a Cobalt ...
Since last fall, well-known backdoor malware SmokeLoader has been upgraded with a new second-stage payload dropper called CoffeeLoader that's tricked out with techniques to beat endpoint security ...
Security researchers Zscaler found a new loader used in different infostealing campaigns CoffeeLoader uses multiple tricks to bypass security and drop additional payloads Interestingly enough, it ...