Security News > 2020 > August > Researchers Warn of Active Malware Campaign Using HTML Smuggling

Researchers Warn of Active Malware Campaign Using HTML Smuggling
2020-08-18 19:16

An active campaign has been spotted that utilizes HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls.

Krishnan Subramanian, security researcher with Menlo Security, told Threatpost that the campaign uncovered on Tuesday, dubbed "Duri," has been ongoing since July.

It works like this: The attackers send victims a malicious link.

Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile, said Subramanian - this campaign shows that bad actors continue to rely on older attack methods that are working.

Learn more about this latest attack and how enterprises can protect themselves from HTML-smuggling attacks, during this week's Threatpost podcast.


News URL

https://threatpost.com/active-malware-campaign-html-smuggling/158439/