Microsoft Threat Intelligence Center (MSTIC) last week disclosed “a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features”…
Tag: espionage
Report: Organizations remain vulnerable to increasing insider threats
The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000…
Bad romance: catphishing explained
You’ve heard or read about some variant of this story before: Girl meets Boy on a dating website. Girl falls in…
Elaborate scripting-fu used in espionage attack against Saudi Arabia Government entity
We recently came across a campaign targeting a Saudi Arabia Government entity via a malicious Word document which at first reminded…
Unpacking the spyware disguised as antivirus
Recently we got access to several elements of the espionage toolkit that has been captured attacking Vietnamese institutions. During the operation,…
Shakti Trojan: Technical Analysis
Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible…
Shakti Trojan: Document Thief
While some ransomware (i.e. Chimera) give bogus threats about stealing and releasing private files, there are other malware families that in fact…