What is particularly worrying is that the malware uses the typo method. This tactic involves creating domain names that closely resemble the names of legitimate companies, in this case mimicking the trusted VMware domain. This clever disguise allows Bifrost to bypass security measures and infect unsuspecting users.

The Trojan then collects sensitive information about the compromised system, including hostname and IP address, potentially exposing the user to further attacks. The recent increase in Bifrost activity (more than 100 variants discovered for Linux) has security experts concerned.

But that’s not all. The threat landscape appears to be expanding. There is reason to believe that attackers are developing ARM versions of Bifrost, targeting the growing number of ARM-based devices such as smartphones and IoT devices. As Sharma notes, “Cybercriminals will likely adapt their tactics to include ARM-based malware, making their attacks more powerful and able to reach a broader range of targets.”

Source: Ferra

Previous articlePretty affordable: AirPods 2 hit all-time low
Next articleIn 2023, Russians withdrew 33.3 trillion rubles from bank cards – a record for the last 10 years
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here