Severity High Analysis Summary DeathRansom has finally succeeded at encrypting files. At a high level, this ransomware follows a sensible design: it scans and encrypts files […]
Severity High Analysis Summary APT37 has likely been active during most of this decade. It primarily focused on targeting the public and private sectors in South […]
Severity Medium Analysis Summary Sextortion scammers have started to utilize new tactics to bypass spam filters and secure email gateways so that their scam emails are […]
Severity Medium Analysis summary Ouija malware is similar to the Mirai botnet. The exploit source attempts to create a web shell and install malware with wget […]
Severity High Analysis Summary IOCs associated with LockerGaga.exe and Kraken.exe have been retrieved. Lockergoga is a ransomware that can spread laterally through network connections and network […]
Severity High Analysis Summary Emotet is a banking Trojan began being used since 2014. During December 2020, it slightly changed the way its client code checks […]
Severity High Analysis Summary Cobalt group activities against financial institutions have been discovered using the CobInt malware family. The malspam e-mail distribution associated with these activities […]
Severity Medium Analysis Summary BRONZE PRESIDENT is a likely People’s Republic of China (PRC)-based targeted cyber espionage group that uses both proprietary and publicly available tools […]
Severity Medium Analysis Summary Zeppelin is the newest member of the Delphi-based Ransomware-as-a-Service (RaaS) family initially known as Vega or VegaLocker. Zeppelin appears to be highly […]