Tag: Malware

  • Click Here! Malvertising and its Effective Manipulation

    Click Here! Malvertising and its Effective Manipulation

    “WARNING! Your iPhone is infected with virus and immediate urgent action is required!” – this was the pop-up that displayed itself on the face of Andrew Reed’s phone. A pop-up that was invoked because of an unintentional click to a website link that was displayed at the top of Google’s search results for “Cookie Recipes”.… Read more

  • Russia’s Persistent Threat to Cyberspace

    Russia’s Persistent Threat to Cyberspace

    Evidence from 2017-2025 Recently, there has been a surprising question circulating: ‘Is Russia a threat to the United States?’ The short answer is yes, and we will explain why—starting with the history of attacks carried out by Russian threat actors.  In May 2024, a Russian-linked ransomware attack paralyzed a major U.S. energy provider, plunging thousands… Read more

  • Predator Spyware: The Silent Stalker in The Digital Jungle

    Predator Spyware: The Silent Stalker in The Digital Jungle

    What is Predator? Could you imagine your phone, the device on which you keep all your sensitive data, have private conversations, and always keep on your person, has betrayed you? No clicks, weird downloads, not even an alert, and no mistakes on your part. Behind the scenes, a sneaky piece of software called spyware lurks… Read more

  • Pegasus Spyware Sextortion Scams – What You Need to Know

    Pegasus Spyware Sextortion Scams – What You Need to Know
    ,

    In recent years, cybercriminals have become increasingly adept at deploying a variety of phishing and extortion tactics to manipulate and intimidate unsuspecting victims. One of the more alarming threats involves the Pegasus spyware sextortion scam, a new twist on classic phishing schemes designed to frighten recipients into paying a ransom. Below, we’ll dive into the… Read more

  • Emerging Threat Review: Storm-0324 & Sangria Tempest 

    Emerging Threat Review: Storm-0324 & Sangria Tempest 

    The newest set of tactics, techniques, and procedures (TTPs) from Storm-0324, otherwise known as DEV-0324, reveals their use of Microsoft Teams to deliver malware through phishing messages and attachments. With corporate networks within their reach, this new evolution raises concerns for companies utilizing Microsoft Teams for day-to-day communications.   Analysis: A publicly available Python-based tool known as… Read more

  • Eldorado: The Golden City of Ransomware-as-a-Service (RaaS) 

    Eldorado: The Golden City of Ransomware-as-a-Service (RaaS) 

    In today’s rapidly evolving technological landscape, new cybercriminal threats are emerging alongside innovations. A ransomware group named Eldorado recently surfaced and, within a few months, successfully breached 16 companies worldwide, including in the United States. This malware poses a threat to both Windows and Linux systems, demonstrating that anyone can be a victim. Eldorado is… Read more

  • DISGOMOJI: Not A Dance Move 

    DISGOMOJI: Not A Dance Move 

    A sophisticated malware targeting Linux servers with emojis as the form of execution, DISGOMOJI has emerged attributed to none other than the threat actor UTA0137. Utilized as part of a cyber-espionage campaign by the Pakistan-based actor, follow along as we dive into what exactly emojis have to do with Linux servers and how these state… Read more

  • Guarding Against Android Cyber Threats  

    When thinking about security measures to fight against malicious activity, rarely do people consider cellular security on the same level as network security. Social engineering techniques used by threat actors including phishing, vishing, and smishing should not be the end of where protection for mobile devices stops at. Identity theft and other types of exploits… Read more

  • Clop Ransomware Gang: Profiling a Notorious Cybercriminal Organization

    , ,

    In recent years, the Clop ransomware gang has emerged as one of the most prolific and notorious cybercriminal organizations. Employing sophisticated techniques and constantly evolving their strategies, the group has successfully targeted high-profile organizations worldwide. This article aims to provide an informative profile of the Clop ransomware gang, detailing its history, operations, and recent activities.… Read more

  • The Play Ransomware Gang: Profile of a Persistent Threat

    , ,

    In recent years, the world has witnessed an alarming rise in cyberattacks, with ransomware being one of the most pervasive and damaging forms of malicious activity. The Play ransomware gang has emerged as a highly disruptive and notorious group among the many ransomware gangs. This article aims to provide an informative and professional profile of… Read more