New BLISTER Malware Using Code Signing Certificates to Evade Detection


Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security defenses and stay under the radar with the goal of deploying Cobalt Strike and BitRAT payloads on compromised systems.

The binary, a loader, has been dubbed ““Blister”” by researchers from Elastic Security, with the malware samples having negligible to zero detections on VirusTotal.

Read More…