{"id":120587,"date":"2021-03-15T21:23:09","date_gmt":"2021-03-16T04:23:09","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/03\/researchers-spotted-malware-written-in-nim-programming-language"},"modified":"2021-03-15T21:23:09","modified_gmt":"2021-03-16T04:23:09","slug":"researchers-spotted-malware-written-in-nim-programming-language","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/03\/researchers-spotted-malware-written-in-nim-programming-language","title":{"rendered":"Researchers Spotted Malware Written in Nim Programming Language"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/researchers-spotted-malware-written-in-nim-programming-language.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have unwrapped an \u201cinteresting email campaign\u201d undertaken by a threat actor that has taken to distributing a new malware written in <a href=\"https:\/\/nim-lang.org\" rel=\"noopener\" target=\"_blank\">Nim<\/a> programming language.<\/p>\n<p>Dubbed \u201c<a href=\"https:\/\/www.proofpoint.com\/uk\/blog\/threat-insight\/nimzaloader-ta800s-new-initial-access-malware\" rel=\"noopener\" target=\"_blank\">NimzaLoader<\/a>\u201d by Proofpoint researchers, the development marks one of the rare instances of Nim malware discovered in the threat landscape.<\/p>\n<p>\u201cMalware developers may choose to use a rare programming language to avoid detection, as reverse engineers may not be familiar with Nim\u2019s implementation, or focused on developing detection for it, and therefore tools and sandboxes may struggle to analyze samples of it,\u201d the researchers said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have unwrapped an \u201cinteresting email campaign\u201d undertaken by a threat actor that has taken to distributing a new malware written in Nim programming language. Dubbed \u201cNimzaLoader\u201d by Proofpoint researchers, the development marks one of the rare instances of Nim malware discovered in the threat landscape. \u201cMalware developers may choose to use a rare [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-120587","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/120587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=120587"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/120587\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=120587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=120587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=120587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}