Category: Malware

Read our latest blog posts

Technical Analysis of MedusaLocker Ransomware

MedusaLocker is a ransomware family that appeared in September 2019 and was employed rapidly for attacks on...

Continue reading

Recordbreaker: The Resurgence of Raccoon

Researcher: Anandeshwar Unnikrishnan Editors: Suchita Katira & Hansika Saxena An info stealer is malicious software (malware) that...

Continue reading

Technical Analysis of Bumblebee Malware Loader

Malware loaders are essentially remote access trojans (RATs) that establish communication between the attacker and the compromised...

Continue reading

In-depth Technical Analysis of Colibri Loader Malware

On 27 August 2021, cybersecurity researchers discovered Colibri loader malware being sold on an underground Russian forum....

Continue reading

Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine

Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)

The blister is a code-signed malware that drops a malicious DLL file on the victim’s system, which...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading