
GuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defenses
GuLoader, also known as CloudEyE, has solidified its position as a persistent threat in the cybersecurity landscape since its emergence. Primarily functioning as a sophisticated downloader, it is designed to retrieve and execute secondary malware payloads, such as the Remcos Remote Access Trojan (RAT) and information stealers like Vidar and Raccoon Stealer. This malware has […] The post GuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defenses appeared first on Cyber Security News.