How would you go about evading the state-of-the-art sandbox? The most straightforward way would be to test your malware versus the industry’s top vendors. A sample we encountered in January, 2021 has . . .
It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see . . .
Stealers are pieces of malicious code written with a hit and run mentality - their main purpose is to find anything of value on an infected device and exfiltrate it back to its operator. The common . . .
A report by Unit 42 uncovered recent malicious activity by TA511. The threat actor added Cobalt Strike to its repertoire, which is used in Active Directory environments. Initial foothold of TA511 is . . .
IcedID is somewhat of a veteran in the MaaS industry, being actively developed and distributed since 2017. The malware-as-a-service, also called Bokbot, has been in extensive use in the last couple . . .
Purple fox is a veteran malware-as-a-service campaign, which until recently, infected devices through its exploit kit capabilities, spreading through vulnerable Microsoft Internet Explorer instances. . . .
An educated workforce should always be a vital part of your cybersecurity protection program, especially when that workforce is predominantly required to work from home. Whether employees are using . . .
FickerStealer is a MaaS (Malware as a Service) stealer that is sold on hacking forums. Its main goal is to steal sensitive information cached by the user - specifically browser passwords - and send . . .
AgentTesla is a .NET based malware, commonly distributed as part of a malspam campaign. Use of AgentTesla soared in 2020, when it became a favorite of threat actors, which used it to achieve initial . . .