Our Blog

Read our latest blog posts

Technical Analysis of Bumblebee Malware Loader

Malware loaders are essentially remote access trojans (RATs) that establish communication between the attacker and the compromised...

Continue reading

Social Media Nexus Spreads Color Prediction Games that Defraud Users

CloudSEK DRP came across an engagement loop called Color Prediction gaming, a financial scam functioning under the...

Continue reading

Philippines Government and Civil Service Commission Data Exposed in May 2022

Threat actors targeted the Philippines Government in May 2022 in cyberattacks, and sensitive Government data was exposed....

Continue reading

YourCyanide: An Investigation into ‘The Frankenstein’ Ransomware that Sends Malware Laced...

Authors: Anandeshwar Unnikrishnan, Rishika Desai, Benila Susan Jacob Executive Summary CloudSEK’s contextual AI digital risk monitoring platform...

Continue reading

Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of...

XVigil discovered a financially motivated threat actor group, dubbed Eternity, actively operating on the internet, selling worms,...

Continue reading

Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group

2021 saw an outbreak of ransomware groups and attacks that affected every major industry across the globe....

Continue reading

Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft,...

Detailed profile on the Cybercriminal group and Threat Actor - Lapsus$ Group. The ransomware gang leaked source...

Continue reading

Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass

Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...

Continue reading

In-depth Technical Analysis of Colibri Loader Malware

On 27 August 2021, cybersecurity researchers discovered Colibri loader malware being sold on an underground Russian forum....

Continue reading

Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine

Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...

Continue reading