Threat analysis

Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat - A North Korean threat group has swapped the usual Hangul Office lures for a cleverly packed Office macro.
SolarWinds advanced cyberattack: What happened and what to do now - Possibly the largest hacking operation of 2020 was just unveiled. In this blog we share what we know and what you should do right now.
German users targeted with Gootkit banker or REvil ransomware - After a noted absence, the Gootkit banking Trojan returns en masse to hit Germany. In an interesting twist, some of the victims may receive ransomware instead.
Malsmoke operators abandon exploit kits in favor of social engineering scheme - Threat actors behind malsmoke, one of the largest malvertising campaigns we've seen in recent months, have switched malware delivery tactics.
Release the Kraken: Fileless injection into Windows Error Reporting service - We discovered a new attack that injected its payload—dubbed
Inter skimming kit used in homoglyph attacks - Threat actors load credit card skimmers using a known phishing technique called homoglyph attacks.
Malspam campaign caught using GuLoader after service relaunch - We discovered a spam campaign distributing GuLoader in the aftermath of the service's relaunch
Chinese APT group targets India and Hong Kong using new variant of MgBot malware - We uncovered an active campaign in early July that we attribute to a new Chinese APT group attacking India and Hong Kong with MgBot malware.
Credit card skimmer targets ASP.NET sites - This unusual web skimmer campaign goes after sites running Microsoft's IIS servers with an outdated version of the ASP.NET framework.

Select your language