TargetCompany Ransomware Abuses FUD Obfuscator Packers

Credit to Author: Don Ovid Ladores| Date: Mon, 07 Aug 2023 00:00:00 +0000

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Read more

Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns

Credit to Author: Trend Micro Research| Date: Fri, 28 Jul 2023 00:00:00 +0000

Trend Micro’s Mobile Application Reputation Service (MARS) team discovered two new related Android malware families involved in cryptocurrency-mining and financially-motivated scam campaigns targeting Android users.

Read more

Possible Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad

Credit to Author: Daniel Lunghi| Date: Fri, 14 Jul 2023 00:00:00 +0000

We recently found that a modified installer of the E-Office app used by the Pakistani government delivered a Shadowpad sample, suggesting a possible supply-chain attack.

Read more

Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad

Credit to Author: Daniel Lunghi| Date: Fri, 14 Jul 2023 00:00:00 +0000

We recently found that an MSI installer built by the National Information Technology Board (NITB), a Pakistani government entity, delivered a Shadowpad sample, suggesting a possible supply-chain attack.

Read more

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Credit to Author: Fernando Merces| Date: Thu, 13 Jul 2023 00:00:00 +0000

An analysis of advanced persistent threat (APT) group Red Menshen’s different variants of backdoor BPFDoor as it evolves since it was first documented in 2021.

Read more

Hunting for A New Stealthy Universal Rootkit Loader

Credit to Author: Sherif Magdy| Date: Tue, 11 Jul 2023 00:00:00 +0000

In this entry, we discuss the findings of our investigation into a piece of a signed rootkit, whose main binary functions as a universal loader that enables attackers to directly load a second-stage unsigned kernel module.

Read more

Tailing Big Head Ransomware’s Variants, Tactics, and Impact

Credit to Author: Ieriz Nicolle Gonzalez| Date: Fri, 07 Jul 2023 00:00:00 +0000

We analyze the technical details of a new ransomware family named Big Head. In this entry, we discuss the Big Head ransomware’s similarities and distinct markers that add more technical details to initial reports on the ransomware.

Read more