This is the second of a series of blog posts covering some of the more common evasion techniques used by malware developers. Feel free to visit the first post dealing for what is arguably the most . . .
We have often observed threat actors using legitimate software for dropping malicious files. This time however is different. This threat actor was able to leave most parts of the attack under the . . .
How would you go about evading the state-of-the-art sandbox? The most straightforward way would be to test your malware versus the industry’s top vendors. A sample we encountered in January, 2021 has . . .
All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and . . .