-
Code Signing Certificates are being used by new BLISTER malware to avoid detection.
According to researchers, evasive malware exploits valid code-signing certificates to evade security measures and deploy Cobalt Strike and BitRAT payloads through compromised systems. Elastic Security experts have dubbed the binary “Blister,” with malware samples that have zero to negligible detections on VirusTotal. At the time of writing, the infection vector, as well as the ultimate…