Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection
Briefly

CoinLurker, written in Go, employs advanced obfuscation and anti-analysis techniques, making it an effective tool for cyber attacks. Its capability to evade detection highlights the evolving sophistication of malware.
The software update alerts use various deceptive entry points like compromised WordPress sites and phishing emails, employing Microsoft Edge Webview2 to execute the payload, complicating detection.
With the EtherHiding technique, compromised sites retrieve the final payload disguised as legitimate tools, using a stolen Extended Validation (EV) certificate to further enhance deception.
The multi-layered injector deploys the payload into the Microsoft Edge process, and CoinLurker's intricate design conceals its actions, making analysis extremely challenging for security measures.
Read at The Hacker News
[
|
]