Tag: Threat Analysis
-
GreenFlash Sundown exploit kit expands via large malvertising campaign
Exploit kit activity has been relatively quiet for some time, with the occasional malvertising campaign reminding us that drive-by …
-
Magecart skimmers found on Amazon CloudFront CDN
Late last week, we observed a number of compromises on Amazon CloudFront – a Content Delivery Network (CDN) – where hosted JavaScript …
-
Hidden Bee: Let’s go down the rabbit hole
Some time ago, we discussed the interesting malware, Hidden Bee. It is a Chinese miner, composed of userland components, as well as of a …
-
Threat spotlight: CrySIS, aka Dharma ransomware, causing a crisis for businesses
CrySIS, aka Dharma, is a family of ransomware that has been evolving since 2006. We have noticed that this ransomware has become …
-
Exploit kits: spring 2019 review
Exploit kit activity remains fairly unchanged since our last winter review in terms of active distribution campaigns. But this spring …
-
“Funky malware format” found in Ocean Lotus sample
Recently, at the SAS conference I talked about “Funky malware formats”—atypical executable formats used by malware that are only …
-
Funky malware format found in Ocean Lotus sample
Recently, at the SAS conference I talked about “Funky malware formats”—atypical executable formats used by malware that are only …
-
Say hello to Baldr, a new stealer on the market
By William Tsing, Vasilios Hioureas, and Jérôme Segura Over the past few months, we have noticed increased activity and development of …
-
The Advanced Persistent Threat files: Lazarus Group
We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed attacks on …
-
Spotlight on Troldesh ransomware, aka ‘Shade’
April 24, 2012 – The fight against malware is a cat-and-mouse game. It is constant and constantly …
-
New Golang brute forcer discovered amid rise in e-commerce attacks
E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware …
●●●