{"id":182872,"date":"2024-02-16T23:26:46","date_gmt":"2024-02-17T05:26:46","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2024\/02\/cybergang-darkgate-uses-captcha-to-spread-malware"},"modified":"2024-02-16T23:26:46","modified_gmt":"2024-02-17T05:26:46","slug":"cybergang-darkgate-uses-captcha-to-spread-malware","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2024\/02\/cybergang-darkgate-uses-captcha-to-spread-malware","title":{"rendered":"Cybergang DarkGate Uses CAPTCHA to Spread Malware"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/cybergang-darkgate-uses-captcha-to-spread-malware2.jpg\"><\/a><\/p>\n<p>This post is also available in: <a href=\"https:\/\/i-hls.com\/he\/archives\/122851\" class=\"\"><img decoding=\"async\" style=\"display:inline; margin: 0;\" class=\"\" src=\"https:\/\/i-hls.com\/wp-content\/plugins\/sitepress-multilingual-cms\/res\/flags\/he.png\" alt=\"he\" title=\"\u05e2\u05d1\u05e8\u05d9\u05ea\"> \u05e2\u05d1\u05e8\u05d9\u05ea (Hebrew)<\/a><\/p>\n<p>HP Wolf Security\u2019s latest threat insights disclosure put a spotlight on DarkGate \u2013 a group of web-based criminals using legal advertising tools to enhance their spam-based malware attacks.<\/p>\n<p>The security report claims DarkGate has been operating as a malware provider since 2018, with an apparent shift in tactics last year of using legitimate advertisement networks \u201cto track victims and evade detection.\u201d The claims are that by using ad services, threat actors can analyze which lures generate clicks and infect the most users \u2013 helping them refine campaigns for maximum impact.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post is also available in: \u05e2\u05d1\u05e8\u05d9\u05ea (Hebrew) HP Wolf Security\u2019s latest threat insights disclosure put a spotlight on DarkGate \u2013 a group of web-based criminals using legal advertising tools to enhance their spam-based malware attacks. The security report claims DarkGate has been operating as a malware provider since 2018, with an apparent shift in [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1496],"tags":[],"class_list":["post-182872","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-law"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/182872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=182872"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/182872\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=182872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=182872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=182872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}