Severity High Analysis Summary The Donot APT – aka APT-C-35 – is a cybercriminal group that mainly targets countries in South Asia, more specifically Pakistan. It […]
Severity High Analysis Summary WannaCry also called WCry or WanaCrptor ransomware malware, was discovered in May 2017, it infected networks running Microsoft Windows as part of […]
Severity High Analysis Summary AsyncRAT is an open-source tool designed for remote monitoring via encrypted connections. However, it could be utilized by threat actors as it […]
Severity Medium Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
Severity High Analysis Summary Gh0st RAT, aka Farfli, PCRat is a remote access trojan that allows an attacker to access an infected machine to harvest sensitive […]
Severity High Analysis Summary WannaCry is also called WCry or WanaCrptor ransomware malware was discovered in May 2017, it infected networks running Microsoft Windows as part […]
Severity High Analysis Summary Panda stealer is a malicious program, a new variant of CollectorStealer, designed to collect and exfiltrate sensitive and personal data from infected […]
Severity High Analysis Summary Sidewinder is a suspected Indian threat actor group that has been active since 2012. They have observed attacking political, military, and corporate […]
Severity High Analysis Summary Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user information to […]