![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHJGuQ5p9WOhoq8PqtnHU97w3zjfCeUS015DGj3mOX3ANhODVRQmfVxV5aX3bkZUIW_T2okuXjgukQsqWPp0DhnWlKtB7OPUjz2puno0MOn3ugzYp681qPPMaZel2rRM8Ogwa-Xbx-nNt-4oINfv3WPCsTkLAi5ddvXM7WuShVqsvuvML5zr97C35XqfNW/s1600/malware.jpg)
An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic.
“New BLISTER update includes keying feature that allows for precise targeting of victim networks and lowers exposure within VM/sandbox environments,” Elastic Security Labs researchers Salim Bitam and Daniel
Source:: The Hackers News