{"id":31942,"date":"2019-11-21T13:44:24","date_gmt":"2019-11-21T13:44:24","guid":{"rendered":"http:\/\/343d8a2a-c7c5-44c4-80f3-63dfd56cde32"},"modified":"2019-11-21T13:44:24","modified_gmt":"2019-11-21T13:44:24","slug":"deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/","title":{"rendered":"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/11\/21\/0e6b9749-ac2e-47df-93d3-341d1dc61b30\/thumbnail\/770x578\/440e1b82475ed715dd53bec46fb67da8\/screenshot-2019-11-21-at-12-09-13.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>A malware downloader has been spotted using novel &#8220;Port Monitor&#8221; methods that have not been detected before in active campaigns.&nbsp;<\/p>\n<p>Dubbed DePriMon, the malicious downloader is used to deploy malware used by Lambert &#8212; also known as the Longhorn advanced persistent threat (APT) group &#8212; which specializes in attacks against European and Middle Eastern companies.&nbsp;<\/p>\n<p>Kaspersky estimates that Lambert has been active since at <a href=\"https:\/\/securelist.com\/unraveling-the-lamberts-toolkit\/77990\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">least 2008<\/a>, whereas Symantec rounds up the year as closer to 2011.&nbsp;<\/p>\n<p>The threat actors use a variety of vulnerabilities, from zero-day bugs including the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-4148\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2014-4148<\/a> Windows exploit and backdoor malware to infiltrate government, financial, telecoms, energy, aviation, IT, and educational sectors, prompting the belief that Lambert may be state-sponsored.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/vegalocker-evolves-into-buran-ransomware-as-a-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">New Buran ransomware-as-a-service tempts criminals with discount licenses<\/a><\/p>\n<p>In 2017, <a href=\"https:\/\/www.symantec.com\/connect\/blogs\/longhorn-tools-used-cyberespionage-group-linked-vault-7\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Symantec said<\/a> that at least 40 targets in 16 countries have been compromised by the attackers.<\/p>\n<p>The APT uses various malware, <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2014\/10\/two-targeted-attacks-two-new-zero-days.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">assigned different colors<\/a> by cybersecurity researchers, to conduct reconnaissance, steal data, and maintain persistence.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>These include Black Lampert, an active implant used to connect to a command-and-control (C2) server for instructions; White Lampert, a passive, network-based backdoor; Blue Lampert, a second-stage malware payload; Green Lampert, an older version of the aforementioned payload; and Pink Lambert, a toolkit including a USB-compromising module and an orchestrator.&nbsp;<\/p>\n<p>The initial Lampert attack vector is unknown. However, the discovery of the malware in tandem with the new DePriMon download is of note.&nbsp;<\/p>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/facebook-google-surveillance-threatens-human-rights-amnesty-international-says\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Facebook, Google &#8216;surveillance&#8217; threatens human rights, Amnesty International says<\/a><\/p>\n<p>ESET published the results of an investigation into the downloader <a href=\"https:\/\/www.welivesecurity.com\/2019\/11\/21\/deprimon-default-print-monitor-malicious-downloader\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in a blog post<\/a> on Thursday. According to the cybersecurity researchers, the code uses &#8220;many non-traditional techniques&#8221; including the registration of a new local port monitor to achieve persistence.&nbsp;<\/p>\n<p>The port monitor is named &#8220;Windows Default Print Monitor&#8221; &#8212; leading to the downloader&#8217;s name &#8212; and has been detected at a private company in Europe, alongside &#8220;dozens of computers&#8221; in the Middle East that were also compromised by Lambert malware.&nbsp;<\/p>\n<p>DePriMon is downloaded to memory and executed as a DLL using reflective DLL techniques. As the downloader is never stored on disk, this can reduce the risk of being detected.&nbsp;<\/p>\n<p>The port monitor is registered with a key and value, which requires administrator rights. To achieve this, the DLL will be loaded by spoolsv.exe on system startup.<\/p>\n<p>&#8220;We believe DePriMon is the first example of malware using this technique ever publicly described,&#8221; ESET says.&nbsp;<\/p>\n<p>A path is then forged for the download and execution of the main malware payloads. This path is encrypted using Microsoft&#8217;s SSL\/TLS and Secure Channel system, initialized with a Windows socket and subsequent SSPI sessions. DePriMon may also use Schannel, depending on the victim&#8217;s system configuration.<\/p>\n<p>DePriMon is then able to communicate with its C2 over TLS. Commands and configuration data is encrypted with AES-256.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/82-of-smb-execs-expect-employees-to-put-business-devices-at-risk-with-holiday-shopping\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">82% of SMB execs expect employees to put business devices at risk with holiday shopping<\/a><\/p>\n<p>&#8220;Thanks to its secure design, the configuration is not left in memory in unencrypted form,&#8221; the researchers say. &#8220;Every time the downloader needs to use some element of the configuration file, it decrypts the configuration file, retrieves the member and encrypts the file again. This design protects the malware&#8217;s primary function &#8212; C2 communication &#8212; against memory forensics.&#8221;<\/p>\n<p>&#8220;DePriMon is an unusually advanced downloader whose developers have put extra effort into setting up the architecture and crafting the critical components,&#8221; ESET added. &#8220;DePriMon is a powerful, flexible and persistent tool designed to download a payload and execute it, and to collect some basic information about the system and its user along the way.&#8221;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is believed the downloader is using techniques not seen before in the wild.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":31943,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-31942","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-21T13:44:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware\",\"datePublished\":\"2019-11-21T13:44:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/\"},\"wordCount\":643,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/\",\"name\":\"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png\",\"datePublished\":\"2019-11-21T13:44:24+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/","og_locale":"en_US","og_type":"article","og_title":"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-11-21T13:44:24+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware","datePublished":"2019-11-21T13:44:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/"},"wordCount":643,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/","url":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/","name":"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png","datePublished":"2019-11-21T13:44:24+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/deprimon-downloader-uses-novel-ways-to-infect-your-pc-with-coloredlambert-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"DePriMon downloader uses novel ways to infect your PC with ColoredLambert malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=31942"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31942\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/31943"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=31942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=31942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=31942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}