Key Learnings from Files Present on the C2 Server of an Infamous Infostealer Malware
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
Home » VirusTotal
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
A ZIP/LNK payload and, with some luck, we will end up identifying the infostealer that is being dropped and its source code…
Interview with Malware Protection expert Leonid Rozenberg with Hudson Rock (www.hudsonrock.com) on exposing information stealers, protecting identities online, hackers who sell vulnerabilities, and how to
Key findings Executive summary Silent Push Threat Analysts have observed the FIN7 group (aka Sangria Tempest) using new tactics in their malware and phishing attacks.
In case you missed it, hackers have been utilizing a new technique to infect victims with Infostealers, it is done by setting a fake Captcha
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.