{
	"id": "8d75a472-5263-4d1f-a194-0aa1dca56407",
	"created_at": "2026-04-06T00:10:31.868383Z",
	"updated_at": "2026-04-10T03:22:13.52354Z",
	"deleted_at": null,
	"sha1_hash": "e27cf72d718b4177f868bd8014557ec73337b917",
	"title": "404",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1108558,
	"plain_text": "404\r\nArchived: 2026-04-05 20:32:22 UTC\r\nPlatform\r\nTrend Vision One™\r\nMarketplace\r\nBrowse Trend-approved partner solutions for our leading platform\r\nLearn more\r\nTrend Vision One™\r\nDeployment Options\r\nYour environment, your choice – deploy Trend Vision One™ as SaaS or customer\r\nhosted\r\nSee moreproducts\r\nTrend Vision One™\r\nCyber Risk Exposure Management (CREM)\r\nThe leader in Exposure Management – turning cyber risk visibility into decisive, proactive\r\nsecurity\r\nLearn moreproducts\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 1 of 17\n\nTrend Vision One™\r\nSecurity Operations (SecOps)\r\nStop adversaries with unrivaled visibility, powered by the intelligence of XDR, Agentic\r\nSIEM, and Agentic SOAR to leave attackers with nowhere left to hide\r\nLearn moreproducts\r\nTrend Vision One™\r\nCloud Security\r\nThe most trusted cloud security platform for developers, security teams, and\r\nbusinesses\r\nLearn moreproducts\r\nTrend Vision One™\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 2 of 17\n\nXDR for Cloud\r\nExtend visibility to the cloud and streamline SOC investigations\r\nLearn moreproducts\r\nTrend Vision One™\r\nWorkload Security\r\nSecure your data center, cloud, and containers without compromising performance by\r\nleveraging a cloud security platform with CNAPP capabilities\r\nLearn moreproducts\r\nTrend Vision One™\r\nContainer Security\r\nSimplify security for your cloud-native applications with advanced container image\r\nscanning, policy-based admission control, and container runtime protection\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 3 of 17\n\nLearn moreproducts\r\nTrend Vision One™\r\nFile Security\r\nProtect application workflow and cloud storage against advanced threats\r\nLearn moreproducts\r\nTrend Vision One™\r\nCloud Risk Management\r\nUnify multi-cloud visibility, eliminate hidden exposure, and secure your future\r\nLearn moreproducts\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 4 of 17\n\nTrend Vision One™\r\nCode Security\r\nProactive Protection for Every Phase of the Software Development Lifecycle\r\nLearn moreproducts\r\nTrend Vision One™\r\nEndpoint Security\r\nDefend the endpoint through every stage of an attack\r\nLearn moreproducts\r\nTrend Vision One™\r\nXDR for Endpoint\r\nStop adversaries faster with a broader perspective and better context to hunt, detect,\r\ninvestigate, and respond to threats from a single platform\r\nLearn moreproducts\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 5 of 17\n\nTrend Vision One™\r\nWorkload Security\r\nOptimized prevention, detection, and response for endpoints, servers, and cloud\r\nworkloads\r\nLearn moreproducts\r\nTrend Vision One™\r\nNetwork Security\r\nExpand the power of XDR with network detection and response\r\nLearn moreproducts\r\nTrend Vision One™\r\nXDR for Network (NDR)\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 6 of 17\n\nStop adversaries faster with a broader perspective and better context to hunt, detect,\r\ninvestigate, and respond to threats from a single platform\r\nLearn moreproducts\r\nNetwork Intrusion Prevention (IPS)\r\nProtect against known, unknown, and undisclosed vulnerabilities in your network\r\nLearn moreproducts\r\nTrend Vision One™\r\nZero Trust Secure Access (ZTSA)\r\nRedefine trust and secure digital transformation with continuous risk\r\nassessments\r\nLearn moreproducts\r\nAI Secure Access\r\nEnsure unified visibility and control for every GenAI service, user, and\r\ninteraction\r\nLearn moreproducts\r\nTrend Vision One™\r\nEmail and Collaboration Security\r\nStay ahead of phishing, BEC, ransomware and scams with AI-powered email security,\r\nstopping threats with speed, ease and accuracy\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 7 of 17\n\nLearn moreproducts\r\nTrend Vision One™\r\nThreat Intelligence\r\nSee threats coming from miles away\r\nLearn moreproducts\r\nTrend Vision One™\r\nIdentity Security\r\nEnd-to-end identity security from identity posture management to detection and response\r\nLearn moreproducts\r\nTrend Vision One™\r\nData Security\r\nPre-empt data leaks with centralized visibility, intelligent risk prioritization, and rapid\r\nresponse capabilities\r\nLearn moreproducts\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 8 of 17\n\nAI at Trend\r\nDiscover AI solutions designed to protect your enterprise, support compliance, and\r\nenable responsible innovation\r\nLearn more\r\nProactive AI Security\r\nStrengthen your defenses with the industry's first proactive cybersecurity AI - no\r\nblind spots, no surprises\r\nProactive AI Security\r\nTrend Cybertron\r\nThe industry’s first proactive cybersecurity AI\r\nTrend Cybertron\r\nTrend Companion\r\nHarness unparalleled breadth and depth of data, high-quality analysis, curation, and\r\nlabeling to reveal meaningful, actionable insights\r\nLearn more\r\nSecurity for AI Stacks\r\nSecure your AI journey and eliminate vulnerabilities before attacks happen – so you\r\ncan innovate with confidence\r\nLearn more\r\nAI Ecosystem\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 9 of 17\n\nShaping the future of cybersecurity through AI innovation, regulatory leadership, and\r\ntrusted standards\r\nLearn more\r\nAI Factory\r\nAccelerate enterprise AI deployment with security, compliance, and trust\r\nLearn more\r\nDigital Twin\r\nHigh-fidelity digital twins enable predictive planning, strategic investments, and\r\nresilience optimization\r\nLearn more\r\nSolutions\r\nEducation\r\nProtect students, faculty, and critical education systems with AI-driven visibility and\r\nautomation designed for always-on learning environments.\r\nLearn more\r\nGovernment\r\nProtect government environments from advanced threats, simplify compliance, and\r\nsecure AI-enabled operations with TrendAI™ Vision One™.\r\nLearn more\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 10 of 17\n\nHealthcare \u0026 Life Sciences\r\nAI cybersecurity for healthcare environments where downtime impacts care delivery,\r\npatient trust, and continuity of care.\r\nLearn more\r\nIndustrial, Energy \u0026 Manufacturing\r\nIndustrial and energy systems are increasingly interconnected, creating blind spots\r\nacross plants, substations, and cloud analytics. We help unify asset discovery and risk\r\nscoring across IT and OT without disrupting uptime.\r\nLearn more\r\nCyber Insurance\r\nBolster your digital security and privacy with cyber insurance\r\nLearn more\r\nBreach Coaches\r\nMinimize risk and maximize security with a breach coach\r\nLearn more\r\nIncidence Response Planning\r\nOutsmart cyber threats by preparing with an Incident Response Plan\r\nLearn more\r\nPre-Breach Services\r\nFortify your cyber defenses with pre-breach assessment services\r\nLearn moreservices\r\nInvision Cyber\r\nIntelligent, risk-based coverage uniquely tailored to your security posture\r\nLearn more\r\nInsurability\r\nHow Trend can help establish eligibility with multiple capabilities\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 11 of 17\n\nLearn more\r\nSmall \u0026 Midsized Business Security\r\nStop threats with easy-to-use solutions designed for your growing business\r\nLearn more\r\nResearch\r\nServices\r\nOur Services\r\nExtend your team with trusted 24/7 cybersecurity experts to predict, prevent, and\r\nmanage breaches.\r\nLearn moreservices\r\nService Packages\r\nAugment security teams with 24/7/365 managed detection, response, and support\r\nLearn moreservices\r\nCyber Risk Advisory\r\nAssess, understand, and mitigate cyber risk with strategic guidance\r\nLearn moreservices\r\nManaged Detection and Response (MDR)\r\nAugment threat detection with expertly managed detection and response (MDR) for\r\nemail, endpoints, servers, cloud workloads, and networks\r\nLearn moreservices\r\nIncident Response\r\nOur trusted experts are on call whether you're experiencing a breach or\r\nlooking to proactively improve your IR plans\r\nLearn moreservices\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 12 of 17\n\nInsurance Carriers and Law Firms\r\nStop breaches with the best response and detection technology on the market\r\nand reduce clients’ downtime and claim costs\r\nLearn moreservices\r\nRed and Purple Teaming\r\nRun real-world attack scenarios to build readiness and fortify your defenses\r\nLearn moreservices\r\nPartners\r\nPartner Program Overview\r\nGrow your business and protect your customers with the best-in-class complete,\r\nmultilayered security\r\nLearn more\r\nPartner Competencies\r\nStand out to customers with competency endorsements that showcase your expertise\r\nLearn more\r\nService Providers (xSP)\r\nDeliver proactive security services from a single, partner-centric security platform\r\nbuilt for MSPs, MSSPs, and DFIR teams\r\nLearn more\r\nAlliance Partners\r\nWe work with the best to help you optimize performance and value\r\nLearn more\r\nTrend Vision One™\r\nMarketplace\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 13 of 17\n\nBrowse Trend-approved partner solutions for our leading platform\r\nLearn more\r\nPartner Resources\r\nDiscover resources designed to accelerate your business’s growth and enhance your\r\ncapabilities as a Trend Micro partner\r\nLearn more\r\nTrend Campus\r\nAccelerate your learning with Trend Campus, an easy-to-use education platform that\r\noffers personalized technical guidance\r\nLearn more\r\nCo-Selling\r\nAccess collaborative services designed to help you showcase the value of Trend\r\nVision One™ and grow your business\r\nLearn more\r\nCompany\r\nCustomer Success Stories\r\nReal-world stories and case studies of how global customers use Trend to predict,\r\nprevent, detect, and respond to threats\r\nLearn morecustomer stories\r\nESG Business Impact\r\nSee how cyber resilience led to measurable impact, smarter defense, and sustained\r\nperformance.\r\nLearn moreopen on a new tab\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 14 of 17\n\nVoice of the Customer\r\nHear directly from our users. Their insights shape our solutions and drive continuous\r\nimprovement.\r\nLearn more\r\nThe Human Connection\r\nMeet the people behind the protection – our team, customers, and improved digital\r\nwell-being.\r\nLearn more\r\nCompare Trend Micro\r\nSee how Trend outperforms the competition\r\nLet's go\r\nTrend Micro vs. Crowdstrike\r\nCrowdstrike provides effective cybersecurity through its cloud-native platform, but its\r\npricing may stretch budgets, especially for organizations seeking cost-effective\r\nscalability through a true single platform\r\nLet's go\r\nTrend Micro vs. Microsoft\r\nMicrosoft offers a foundational layer of protection, yet it often requires supplemental\r\nsolutions to fully address customers' security problems\r\nLet's go\r\nTrend Micro vs. Palo Alto Networks\r\nPalo Alto Networks delivers advanced cybersecurity solutions, but navigating its\r\ncomprehensive suite can be complex and unlocking all capabilities requires\r\nsignificant investment\r\nLet's go\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 15 of 17\n\nInternet Safety and Cybersecurity Education\r\nLearn more\r\nFormula 1 Partnership\r\nOfficial partner of the McLaren Formula 1 Team\r\nLearn more\r\nUnlock Your Free Trials products\r\nContact Us\r\nUnder Attack?\r\n2 Alerts\r\nSupport\r\nBusiness Solutions open on a new tab\r\nConsumer Solutions open on a new tab\r\nEducation and Certification services\r\nContact Support open on a new tab\r\nFind a Support Partner open on a new tab\r\nResources\r\nAI Innovation\r\nTrend Micro vs. Competition\r\nCybersecurity Terms Library\r\nThreat Encyclopedia\r\nGlossary of Terms\r\nWebinars\r\nLog In\r\nTrend Vision One open on a new tab\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 16 of 17\n\nSupport open on a new tab\r\nPartner Portal open on a new tab\r\nCloud One open on a new tab\r\nProduct Activation and Management open on a new tab\r\nReferral Affiliate open on a new tab\r\nSource: https://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://w\r\nww.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html\r\nPage 17 of 17",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.htmlhttps://www.trendmicro.com/en_us/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html"
	],
	"report_names": [
		"Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434231,
	"ts_updated_at": 1775791333,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e27cf72d718b4177f868bd8014557ec73337b917.pdf",
		"text": "https://archive.orkl.eu/e27cf72d718b4177f868bd8014557ec73337b917.txt",
		"img": "https://archive.orkl.eu/e27cf72d718b4177f868bd8014557ec73337b917.jpg"
	}
}