Since March of 2022 we’ve seen a gradual uptick in Adobe Acrobat Reader processes attempting to query which security product DLLs are loaded into it by acquiring a handle of the DLL. The significant . . .
What makes Ransomware so different from other malware and cyber threats?
Cyber threats are nothing new. I remember back in the late 80s my brother and I managed to infect our parents' x86 computer with a ping pong virus which simply placed an annoying ping pong ball on . . .
Read More >>SunCrypt Ransomware Gains New Capabilities in 2022
SunCrypt is a RaaS (Ransomware as a Service) group that was first seen in October 2019, and was one of the first groups to apply triple extortion* tactics to their attacks. Unlike other RaaS groups, . . .
Read More >>Malware Evasion Techniques - Living off the Land
This is the second of a series of blog posts covering some of the more common evasion techniques used by malware developers. Feel free to visit the first post dealing for what is arguably the most . . .
Read More >>Lockbit 2.0 ransomware surges in 2022
We’ve barely started March 2022, but according to LockBit’s 2.0 Onion website, they have already successfully targeted over 100 different organizations so far.
Read More >>Ukraine Computers Hit By Wiper Attacks As Russia Advances
As Russia began its initial offensive into Ukraine, another kind of attack unfolded inside Ukrainian networks. A destructive wave of wiper malware attacks began corrupting files in hundreds of . . .
Read More >>Virtual Patching - what it is and why it is crucial for threat prevention
Virtual patching is a highly effective technique for countering zero-day threats, i.e., stealthy cyber threats designed to exploit system and application vulnerabilities that software vendors have . . .
Read More >>MyloBot 2022 – Evasive botnet that just sends extortion emails?
MyloBot was first detected in 2018 and was one of the most evasive Botnets at the time. According to various reports, it incorporated different techniques such as:
Read More >>Independent Research Confirms that Minerva’s Armor Is One of the Best Endpoint Security Solutions Available
At Minerva we are proud of our products and believe in their ability to put malware to bed. That’s why we were happy to hear that we scored high marks in a recently published research paper that . . .
Read More >>Malicious Telegram Installer Drops Purple Fox Rootkit
We have often observed threat actors using legitimate software for dropping malicious files. This time however is different. This threat actor was able to leave most parts of the attack under the . . .
Read More >>2021 Was the Year Ransomware Protection Accelerated Enterprise Security Maturity
As one of the most debilitating and disruptive threats to ever exist in the Information Security landscape, ransomware and ransomware protection has been at the top of every enterprise security . . .
Read More >>Meet the TimeTime ransomware - the ransomware that asks for €100 via PaySafeCard
Every day we hear about the growing number of sophisticated ransomware groups, such as the infamous Conti, Khonsari and BlackCat. These groups usually exfiltrate and encrypt their victims’ data (a . . .
Read More >>