National Cyber Warfare Foundation (NCWF)

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement


0 user ratings
2025-03-26 17:27:54
milo
Red Team (CNA)

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object Model (COM) objects in Windows systems. This method, based on research by James Forshaw of Google Project Zero, allows attackers to execute .NET managed code in the context of a server-side Distributed COM (DCOM) process. […]


The post Hackers Exploit COM Objects for Fileless Malware and Lateral Movement appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.



Aman Mishra

Source: gbHackers
Source Link: https://gbhackers.com/hackers-exploit-com-objects-for-fileless-malware/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.