Author: CloudSEK

Read our latest blog posts

Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group

2021 saw an outbreak of ransomware groups and attacks that affected every major industry across the globe....

Continue reading

Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass

Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...

Continue reading

Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine

Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)

The blister is a code-signed malware that drops a malicious DLL file on the victim’s system, which...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability

The Log4J vulnerability, which is being actively exploited in the wild, has led to a significant spike...

Continue reading

Emotet 2.0: Everything you need to know about the new Variant...

Since it was first identified in 2014, the Emotet banking trojan has been a persistent threat that...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)

We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)

We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...

Continue reading

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading