Blogs

Blog Image

Lazarus Group Updates Operation Dream Job Campaign 

Summary  

North Korean threat actor, Lazarus Group, was observed shifting their focus and evolving tools and tactics as part of a long-running campaign called Operation Dream Job cluster, also tracked under the monikers DeathNote or NukeSped. While the group is known for targeting the cryptocurrency sector, recent attacks have targeted the medical, automotive, academic, energy, and defense sectors in Eastern Europe and other parts of the world.

Blog Image

Threat Research: Legion Hacking Tool  

What is the Legion Hacking Tool? 

Legion, a new Python-based credential harvester and Simple Mail Transfer Protocol (SMTP) hijacking tool, has been developed to target online email services for phishing and spam campaigns, and is being advertised for sale on Telegram. The malware is primarily intended to scan for and parse Laravel application secrets from exposed user environment variables (.env) files.

Blog Image

Cybercrime: The World’s 3rd Largest Economy 

How Big is the Cybercrime Economy? 

According to the World Economic Forum (WEF), cybercrime is now the world’s third-largest economy coming in behind the United States and China.

Blog Image

Threat Research: Multiple Chinese Threat Actors Using New Mélofée Malware 

Summary  

Mélofée, a new malware family, was recently discovered being used by the Chinese state-sponsored hacking groups Winnti Advanced Persistent Threat (APT) group, and Earth Berberoka targeting Linux servers. There are three different samples of the malware being circulated. All three versions of the malware share a common code base that uses shell commands to download the rootkit and the main implant from an attacker-controlled server.

Blog Image

The Top 10 MDR Capabilities your Provider Needs (and the Biggest Mistakes to Avoid)     

MDR services are gaining popularity as organizations seek more effective measures to identify and respond to security threats. With the increasing frequency and sophistication of cyberattacks, it's crucial to choose the right MDR provider to reduce your risk exposure and protect your critical assets. 

Blog Image

The Rise of FusionCore: An Emerging European Cybercrime Group

FusionCore is a group that operates as both malware developers and threat actors, providing malware subscriptions as well as hacker-for-hire services. They specialize in a wide range of malware and use phishing as their primary attack vector for initial access.  

Blog Image

New IcedID Variants Surface in the Wild 

The threat actors behind the IcedID (a.k.a. BokBot) banking trojan are making strides to update and improve the malware. Analysis of several recent campaigns show new variants of the malware are shifting away from its original functionality to deliver additional payloads instead, specifically ransomware. Additionally, the creators removed unnecessary functions making IcedID stealthier, and increasing its detection and evasion capabilities.

Blog Image

Threat Research: Cl0p Ransomware Increases Activity 

Summary  

Cl0p ransomware, a Ransomware-as-a-Service (RaaS) model, has targeted over 90 organizations worldwide, with more than 50 of these attacks occurring within the United States. In March 2023, the Cl0p leak site listed 91 victims, which is an increase of over 65% in the total number of attacks between August 2020 and February 2023. It is assessed that this sudden increase in ransomware attacks is likely associated with the group’s exploitation of the zero-day vulnerability, CVE-2023-0669.

Blog Image

UNC4466 Exploits Multiple Vulnerabilities to Deliver ALPHV Ransomware  

Summary  

An emerging ALPHV (a.k.a. BlackCat, Noberus) affiliate, tracked as UNC4466, is exploiting CVE-2021-27876, CVE-2021-27877 and CVE-2021-27878 in publicly exposed installations of Veritas Backup Exec. These vulnerabilities grant the threat actors initial access to victim environments. A recent internet scan revealed over 8,500 instances of Veritas Backup Exec are currently exposed to the internet. It is unknown if all these installations have been updated with Veritas Backup software version 21.2.

Blog Image

Tackling Cross-Domain Cyber Threats: Microsoft XDR & Critical Start MDR to the Rescue 

Let’s face it, in our ever-growing digital world, cybersecurity is a big deal. A multi-trillion-dollar big deal! Cybercriminals are getting craftier, using multi-stage attacks and cross-domain techniques that can make life difficult for cybersecurity operations. To add to that, Security Operations Center (SOC) teams are often in a spot where they are very much behind the 8-ball staff wise, skillset wise, tool wise, or worse, all the above.

Blog Image

Dark Power Ransomware: A Nim-Programmed Threat 

The Dark Power ransomware, a relatively new ransomware strain, was launched in early February 2023. It is a rare breed of ransomware, as it was written in the Nim programming language. The ransomware targets Microsoft Windows platforms, and its impact is high, as it encrypts files on the compromised machine and demands a ransom for file decryption.