Salat Malware Abuses QUIC and WebSockets for Stealthy C2 Control
A powerful new Windows malware family dubbed Salat Stealer, a Go-based Remote Access Trojan (RAT) that blends classic infostealing with a stealthy QUIC/WebSocket command-and-control (C2) channel and resilient blockchain-backed infrastructure. Written in Go, it supports remote shell access, desktop a
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] North Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malware
- [CYBER] Critical vm2 sandbox bug lets attackers execute code on hosts
- [CYBER] Ekubo DEX Users Drained for $1.4M in Token Approval Exploit - Yahoo Finance
- [CYBER] New Cisco DoS flaw requires manual reboot to revive devices
- [CYBER] Is AI generated code creating a non-linear security problem for AppSec teams?
- [CYBER] The NPM Audit Trap: A Thursday Morning Tragedy