Category: Malware

Read our latest blog posts

In-depth Technical Analysis of Colibri Loader Malware

On 27 August 2021, cybersecurity researchers discovered Colibri loader malware being sold on an underground Russian forum....

Continue reading

Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine

Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)

The blister is a code-signed malware that drops a malicious DLL file on the victim’s system, which...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading

Analysing Third-Party App Stores for Modded APKs Through Signature Verification

Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on...

Continue reading

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading

How Browser Extensions can Exploit User Activities for Malicious Operations

All browser extensions may not be malicious, but they are dangerous. We explain how extensions exploit permissions...

Continue reading