Researchers at Securonix released an analysis on a sophisticated, targeted attack against military contractors they have named STEEP#MAVERICK. The attack chain for this attack began as a phishing email containing a zip archive, which contained a .lnk file disguised as a pdf that contained the Command and Control (C2) stager. The stager was an eight-step preparation process containing multiple types of PowerShell obfuscation which pulls an apparent .png that decrypts into the final payload.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security