Tag : persistence

15 attack reports | 0 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
Warning Against the Distribution of Malware Disguised as Software Cracks July 19, 2024, 5:17 a.m. This advisory cautions about the distribution of malware masquerading as crack programs for software. The malicious actors aim to… 1
Kematian-Stealer: A Deep Dive into a New Information Stealer July 10, 2024, 10:08 a.m. This report provides an in-depth analysis of a newly discovered information stealer named Kematian-Stealer, actively developed on… 4
Distribution of AsyncRAT Disguised as Ebook July 10, 2024, 9:22 a.m. This analysis covers the distribution of AsyncRAT malware disguised as an ebook. The compressed file contains a malicious LNK and… 5
New Threat: A Deep Dive Into the Zergeca Botnet July 5, 2024, 3:33 p.m. An analysis of a newly discovered botnet named Zergeca, implemented in Go language, with capabilities for DDoS attacks, proxying,… 13
Malvertising Campaign Leads to Execution of Oyster Backdoor June 24, 2024, 6:48 p.m. Rapid7 has observed a recent malvertising campaign that lures users into downloading malicious installers for popular software su… 13
RAT Distributed as UUEncoding (UUE) File June 11, 2024, 10:11 a.m. This intelligence report describes a malicious operation where the Remcos Remote Access Trojan (RAT) is being disseminated throug… 3
Malware Targets Message Queuing Services Applications June 6, 2024, 6:44 p.m. The report describes a recent campaign targeting Apache RocketMQ platforms, where attackers exploited a known vulnerability (CVE-… 21
Wineloader - Analysis of the Infection Chain June 6, 2024, 8:13 a.m. The analysis examines the Wineloader backdoor, a modular malware attributed to the APT29 threat group, which allows further tools… 9
Vidar Stealer: An In-depth Analysis of an Information-Stealing Malware June 4, 2024, 1:17 p.m. Vidar Stealer is a potent malware written in C++, capable of stealing a wide range of data from the compromised system. Vidar Ste… 6
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion May 24, 2024, 1:52 p.m. This report details a sophisticated cyber intrusion targeting MITRE's research network (NERVE) through the exploitation of Ivanti… 4
Malware (XMRig, OrcusRAT, etc.) disguised as MS Office crack May 10, 2024, 1:45 p.m. The report details an ongoing malware campaign targeting South Korean users, which disguises malicious payloads as cracked versio… 12
macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge May 10, 2024, 8:31 a.m. This analysis discusses the emergence of a new macOS malware family called 'Cuckoo Stealer', which acts as an infostealer and spy… 4
Dissecting REMCOS RAT: An in-depth analysis of a widespread 2024 malware, Part Four May 9, 2024, 3:14 p.m. This comprehensive analysis provides a thorough examination of the REMCOS Remote Access Trojan (RAT), a prominent malware threat … 34
Stealer Distributed via Crafted Minecraft Source Pack May 8, 2024, 11:09 a.m. This report details the operation of the zEus stealer malware, which is distributed through a crafted Minecraft source pack. The … 23
Fletchen Stealer: An Information Stealer with Sophisticated Anti-Analysis Measures April 29, 2024, 6:16 p.m. This in-depth analysis examines Fletchen stealer, an advanced information-stealing malware featuring potent anti-analysis capabil… 13