Full Story on:A sophisticated PowerShell-based malware named TAMECAT has emerged as a critical threat to enterprise security, targeting login credentials stored in Microsoft Edge and Chrome browsers.
This malware operates as part of espionage campaigns conducted by APT42, an Iranian state-sponsored cyber-espionage group that has been actively targeting high-value senior defense and government officials worldwide.
The threat demonstrates advanced capabilities in credential theft, data exfiltration, and persistent access to compromised systems.
TAMECAT employs a multi-stage infection process that begins with social engineering tactics.
The attackers impersonate trusted WhatsApp contacts and send victims malicious links that abuse the search-ms URI protocol handler.
Once activated, the malware downloads a VBScript that performs antivirus detection on the target system to determine the appropriate execution path.
TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
TAMECAT PowerShell malware steals Edge and Chrome credentials in APT42 Iranian espionage targeting government officials.
cybersecuritynews.com
