Hackers Abuse COM Objects for Fileless Malware Lateral Movements

A sophisticated technique was recently detected by researchers where attackers abuse Component Object Model (COM) objects to execute fileless malware for lateral movement across networks. This technique, detailed in research from March 2025, leverages legitimate Windows functionality to establish persistence and evade traditional security controls, marking a significant evolution in attack methodologies. The attack exploits […]

The post Hackers Abuse COM Objects for Fileless Malware Lateral Movements appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: