Watch how SentinelOne mitigates and rolls back “SquirrelWaffle” malware. “SquirrelWaffle” is the name for a newly discovered malware family (primary:backdoor/loader). SquirrelWaffle has been used in conjunction with Cobalt Strike for management and overall campaign control. Since early September 2021, the malware has been known to be delivered via malicious MS Office documents.
The ultimate goal of the malicious/phishing documents is to lead to the loading of a Cobalt Strike beacon. The documents, in turn, reach out to a remote server (via cscript) to pull down additional malicious files like PowerShell and VBA scripts, as well as malicious DLLs. The accompanying VBA script can then be used to launch the associated executable (DLLs).
#squirrelwaffle #cybersecurity #infosec #endpointprotection #malware #ransomware #cobaltstrike
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.