<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Supply Chain Attack – We Can’t Predict It, But We Can Stop It

Modern technology is making our life easier, but it also makes us more vulnerable in the face of the attacker. From multinational organizations, all the way down to individuals with a simple smart . . .

 

Why Ransomware Protection Is A Vital Part of Healthcare

The healthcare industry is one of the most targeted verticals for ransomware attacks. According to IBM’s data breach report, in healthcare, 50% of data breaches [in the US] were due to malicious . . .

 

Taurus Loader: User-Guided Infection

In recent months we have seen a spike in events associated with Taurus loader. Although Taurus has already been covered extensively by researchers, we think its spreading method was left untouched . . .

 

Crackonosh - The Hidden Crypto Mining Malware

An article by Avast has introduced a novel malware by the name Crackonosh. This computer virus spreads through cracked software, specifically through illicit video game copies. The malware’s main . . .

 

Please Note: The Kesaya Attack Was Preventable With Minerva Technology

On Friday, 02.07.21, computers running Kaseya VSA have been installing a malicious update that contains the REvil ransomware. This monumental breach has caught many MSP companies that use Kaseya . . .

 

Does the US 2021 Cybersecurity Executive Order do enough to protect government agencies?

Lessons from the Colonial Pipeline, and SolarWinds Attack

Cyberattacks and their real world consequences: SolarWinds was infamously hacked around March 2020, in an attack that made international . . .

 

Sload Targeting Europe Again

Sload (also known as Starslord loader) is one of the most dangerous types of malware in recent years. It usually functions as a downloader, which is a computer virus that collects and exfiltrates . . .

 

SystemBC Malware Hides Behind Socks5 Proxy

SystemBC malware has been used by hackers at least since 2019, when Proofpoint released a detailed analysis of the trojan and its methods of infection. The malware is sold on underground hacking . . .

 

SolarWind Attackers Launch New Wave Of Phishing Attacks

A new wave of NOBELIUM attacks has been reported by Microsoft. NOBELIUM is the same threat actor Microsoft attributed the SolarWinds attack to, a Russian based group attacking mostly US-based . . .

 

Trapping A Fat Quasar RAT

How would you go about evading the state-of-the-art sandbox? The most straightforward way would be to test your malware versus the industry’s top vendors. A sample we encountered in January, 2021 . . .

 

Rigging a Windows Installation

It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see . . .

 

RedLine Stealer Masquerades as Telegram Installer

Stealers are pieces of malicious code written with a hit and run mentality, their main purpose is to find anything of value on an infected device and exfiltrate it back to its operator. The common . . .

 
1 2 3 4 5

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all