Tag: advanced persistent threat
2 attack reports | 0 vulnerabilities
Attack reports
Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
This intelligence report details a sophisticated malware campaign targeting multiple industries across various countries. The threat actor employs advanced tactics, techniques, and procedures (TTPs) to infiltrate networks, maintain persistence, and exfiltrate sensitive data. The malware used in thi…
Downloadable IOCs 16
CheckMesh: Hidden Threats in Your FW
This report examines an advanced cyber-attack targeting an Israeli enterprise, where a sophisticated threat actor compromised a Check Point firewall by deploying a malicious ELF implant known as MeshAgent. The implant, disguised as a legitimate process, enabled encrypted communication with the atta…
Downloadable IOCs 9
Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
This intelligence report details a sophisticated malware campaign targeting multiple industries across various countries. The threat actor employs advanced tactics, techniques, and procedures (TTPs) to infiltrate networks, maintain persistence, and exfiltrate sensitive data. The malware used in thi…
Downloadable IOCs 16
CheckMesh: Hidden Threats in Your FW
This report examines an advanced cyber-attack targeting an Israeli enterprise, where a sophisticated threat actor compromised a Check Point firewall by deploying a malicious ELF implant known as MeshAgent. The implant, disguised as a legitimate process, enabled encrypted communication with the atta…
Downloadable IOCs 9