Tag: post-exploitation
2 attack reports | 0 vulnerabilities
Attack reports
SideWinder APT's post-exploitation framework analysis
SideWinder APT group has expanded its activities, targeting high-profile entities in the Middle East and Africa. The group employs a multi-stage infection chain using spear-phishing emails with malicious attachments. A new post-exploitation toolkit called 'StealerBot' has been discovered, designed …
Downloadable IOCs 158
Wreaking havoc in cyberspace: threat actors experiment with pentest tools
Recent research reveals adversaries increasingly using the Havoc post-exploitation framework to bypass cybersecurity systems. Two campaigns utilizing this framework were analyzed. The first campaign involved phishing emails with malicious archives containing ISO files and LNK files, which downloade…
Downloadable IOCs 0
SideWinder APT's post-exploitation framework analysis
SideWinder APT group has expanded its activities, targeting high-profile entities in the Middle East and Africa. The group employs a multi-stage infection chain using spear-phishing emails with malicious attachments. A new post-exploitation toolkit called 'StealerBot' has been discovered, designed …
Downloadable IOCs 158
Wreaking havoc in cyberspace: threat actors experiment with pentest tools
Recent research reveals adversaries increasingly using the Havoc post-exploitation framework to bypass cybersecurity systems. Two campaigns utilizing this framework were analyzed. The first campaign involved phishing emails with malicious archives containing ISO files and LNK files, which downloade…
Downloadable IOCs 0