{"id":59625,"date":"2024-11-09T06:55:38","date_gmt":"2024-11-09T06:55:38","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/"},"modified":"2024-11-09T06:57:03","modified_gmt":"2024-11-09T06:57:03","slug":"this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/","title":{"rendered":"This new malware utilizes a rare programming language to evade traditional detection methods"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/cdn.mos.cms.futurecdn.net\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg\" \/><\/p>\n<div id=\"article-body\">\n<hr\/>\n<ul>\n<li><strong>New customized malware loader written in JPHP is wreaking havoc<\/strong><\/li>\n<li><strong>The customized payload is troublesome to detect utilizing cybersecurity instruments<\/strong><\/li>\n<li><strong>The malware-loader can deploy customized payloads as required<\/strong><\/li>\n<\/ul>\n<hr\/>\n<p>Trustwave SpiderLabs says it has <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/pronsis-loader-a-jphp-driven-malware-diverging-from-d3fck-loader\/\" target=\"_blank\" data-url=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/pronsis-loader-a-jphp-driven-malware-diverging-from-d3fck-loader\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" rel=\"noopener\">recently uncovered<\/a> a brand new type of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-malware-removal\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-malware-removal\">malware<\/a> often known as Pronsis Loader, which is already inflicting bother as a result of its distinctive design and techniques.<\/p>\n<p>Pronsis Loader makes use of JPHP, a lesser-known programming language not often utilized by cybercriminals, and alsoemploys superior set up strategies, making it more difficult for cybersecurity programs to detect and mitigate.<\/p>\n<aside class=\"hawk-nest\" data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\"\/>\n<p>JPHP, a variation of the favored PHP language, is never seen on this planet of malware improvement. Whereas PHP is often used for net purposes, its integration into desktop malware improvement is uncommon, giving Pronsis Loader a bonus in avoiding detection.<\/p>\n<h2 id=\"jphp-a-rare-choice-in-cybercrime-3\">JPHP \u2013 a uncommon selection in cybercrime <\/h2>\n<p>Pronsis Loader can evade signature-based detection programs, that are usually designed to acknowledge extra widespread programming languages in malware. JPHP offers the malware a layer of \u201cstealth\u201d permitting the malware to fly beneath the radar of many safety instruments.<\/p>\n<p>The malware additionally makes use of obfuscation and <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-encryption-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-encryption-software\">encryption<\/a> strategies to cover its presence in the course of the preliminary an infection part. Upon execution, it deploys complicated strategies to keep away from triggering conventional <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-antivirus\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-antivirus\">antivirus<\/a> software program and <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\">endpoint protection<\/a> programs. The loader first installs itself silently within the system, disguising its actions by mimicking legit processes or purposes, making it troublesome for each automated safety instruments and human analysts to identify.<\/p>\n<p>As soon as put in, Pronsis Loader can obtain and execute further malware, together with <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-ransomware-protection\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-ransomware-protection\">ransomware<\/a>, spy ware, or knowledge exfiltration instruments. This modular method makes the malware extremely versatile, permitting attackers to tailor the ultimate payload based mostly on the goal\u2019s system or atmosphere. Pronsis Loader is a part of an rising pattern in malware improvement the place attackers use loaders as a primary step in multi-stage assaults. These loaders, designed to introduce different malware right into a system, present attackers with flexibility.<\/p>\n<p>To fight these evolving threats, safety groups ought to undertake extra superior monitoring and evaluation strategies, equivalent to behavior-based detection, which may determine malware by its actions reasonably than its code signatures alone. Moreover, steady updates to menace intelligence may also help determine the usage of uncommon languages and strategies like these employed by Pronsis Loader.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-FL5PzK5ARKZRqbQWwzTAAV\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-FL5PzK5ARKZRqbQWwzTAAV slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Signal as much as the TechRadar Professional e-newsletter to get all the highest information, opinion, options and steerage what you are promoting must succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>&#8220;Pronsis Loader marks a notable shift in how cybercriminals are deploying malware, using JPHP and silent installations to evade conventional detection strategies. Its capacity to ship high-risk payloads like Lumma Stealer and Latrodectus makes it notably harmful,\u201d mentioned Shawn Kanady, World Director of Trustwave SpiderLabs.<\/p>\n<p>\u201cOur analysis uncovers not solely the malware\u2019s distinctive capabilities but in addition the infrastructure that could possibly be leveraged in future campaigns to provide safety groups an opportunity to strengthen their defences,\u201d Kanady added.<\/p>\n<h3 class=\"article-body__section\" id=\"section-you-might-also-like\"><span>You may also like<\/span><\/h3>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techradar.com\/pro\/security\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New customized malware loader written in JPHP is wreaking havoc The customized payload is troublesome to detect utilizing cybersecurity instruments The malware-loader can deploy customized&#8230;<\/p>\n","protected":false},"author":1,"featured_media":59626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-59625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This new malware utilizes a rare programming language to evade traditional detection methods - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This new malware utilizes a rare programming language to evade traditional detection methods - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-09T06:55:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-09T06:57:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/11\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"970\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"This new malware utilizes a rare programming language to evade traditional detection methods\",\"datePublished\":\"2024-11-09T06:55:38+00:00\",\"dateModified\":\"2024-11-09T06:57:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/\"},\"wordCount\":517,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/\",\"name\":\"This new malware utilizes a rare programming language to evade traditional detection methods - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg\",\"datePublished\":\"2024-11-09T06:55:38+00:00\",\"dateModified\":\"2024-11-09T06:57:03+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg\",\"width\":970,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/11\\\/09\\\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This new malware utilizes a rare programming language to evade traditional detection methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This new malware utilizes a rare programming language to evade traditional detection methods - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/","og_locale":"en_US","og_type":"article","og_title":"This new malware utilizes a rare programming language to evade traditional detection methods - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2024-11-09T06:55:38+00:00","article_modified_time":"2024-11-09T06:57:03+00:00","og_image":[{"width":970,"height":540,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/11\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"This new malware utilizes a rare programming language to evade traditional detection methods","datePublished":"2024-11-09T06:55:38+00:00","dateModified":"2024-11-09T06:57:03+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/"},"wordCount":517,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/11\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/","url":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/","name":"This new malware utilizes a rare programming language to evade traditional detection methods - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/11\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg","datePublished":"2024-11-09T06:55:38+00:00","dateModified":"2024-11-09T06:57:03+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/11\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/11\/Kkw378oRCp67SmYpJptJZU-1200-80.jpg","width":970,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/11\/09\/this-new-malware-utilizes-a-rare-programming-language-to-evade-traditional-detection-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"This new malware utilizes a rare programming language to evade traditional detection methods"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/59625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=59625"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/59625\/revisions"}],"predecessor-version":[{"id":59627,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/59625\/revisions\/59627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/59626"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=59625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=59625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=59625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}