Amr ThabetinMalTrakCOM Object P.3: C&C and Lateral MovementsIn the previous blog posts, we looked at how attackers and red teamers can abuse COM Objects to bypass whitelisting, file signatures, and…Jun 16, 20211Jun 16, 20211
Amr ThabetinMalTrakCOM Objects P.2: Your Stealthy Fileless AttackIn the previous blog post, We have talked about COM Objects and how you can craft a COM Scriptlet with javascript or VBScript code that…Jun 2, 2021Jun 2, 2021
Amr ThabetinMalTrakCOM Objects P.1: The Hidden Backdoor in Your SystemIn the last few years, attackers have abused COM Objects to craft their Fileless attacks, evade defenses, bypass whitelisting, and even…May 26, 2021May 26, 2021