Report: Organizations remain vulnerable to increasing insider threats

The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Read more

Bad romance: catphishing explained

You may have heard of catfishing, where people lure romancers online by faking their identity. But what about catphishing? This dangerous practice uses similar romantic triggers, only its goal is to dupe users and businesses out of personal info.

Read more

Elaborate scripting-fu used in espionage attack against Saudi Arabia Government entity

In this post, we take apart a clever set of scripts used in a targeted attack against the government of Saudi Arabia.

Read more

Unpacking the spyware disguised as antivirus

Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation, the malware was used to dox 400,000 members of Vietnam Airlines.

Read more

Shakti Trojan: Technical Analysis

Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible attribution has led us to the conclusion that this threat is in reality not new – probably it has been designed in 2012 for the purpose of corporate espionage operations. Yet it escaped from…

Read more

Shakti Trojan: Document Thief

Recently, Bleeping Computer published a short article about an unrecognized Trojan that grabs documents from the attacked computer and uploads them into a malicious server. Looking at the characteristics of the tool, we suspect that it has been prepared for the purpose of corporate espionage. So far, no AV has given any meaningful identification to this malware—it is detected under generic names. Since not much is known about its internals, we decided to take a closer look.

Read more

Select your language