
Hide and Seek | New Zloader Infection Chain Comes With Improved Stealth and Evasion Mechanisms
A new ZLoader campaign abuses Google Ads to target European banking institutions with signed MSI payloads and more than 300 domains.
Read More
A new ZLoader campaign abuses Google Ads to target European banking institutions with signed MSI payloads and more than 300 domains.
Hive is a double-extortion ransomware group that’s hit over 30 organizations. Read our deep-dive into the ransomware toolkit.
Conti’s rapid encryption speed is matched only by its rapid evolution. SentinelLabs’ deep dive explores its development in unprecedented detail.
A widespread phishing campaign in operation since May is using a mix of old and new evasion tricks to drop IcedID malware.
Gootloader expands its scope to target military, pharmaceutical and energy sectors, operating on an Initial Access As a Service model.
This crypto mining campaign doesn’t use notable exploit components but leverages shell scripts to infect cloud containers and bypass AVs.
Unbreakable encryption, a data leak site and threats of DDoS attacks, Avaddon has all the tricks of a modern RaaS. And now version 2 is on the way.
HelloKitty lacks the stealth of Ryuk, REvil and Conti, but has still struck some notable targets, including CEMIGO. Ransomware overview and IoCs here.
Zeoticus is a Windows-specific ransomware that can execute fully offline with no callback to a C2, making network activity detection rules redundant.
Adware infections may appear unremarkable at first, but in this example incident analysis we demonstrate their growing sophistication and risk.