Leveraging Data Science to Minimize the Blast Radius of Ransomware Attacks

Credit to Author: Vladimir Kropotov| Date: Thu, 02 Mar 2023 00:00:00 +0000

In this blog entry, we present a case study that illustrates how data-science techniques can be used to gain valuable insights about ransomware groups’ targeting patterns as detailed in our research paper, “What Decision-Makers Need to Know About Ransomware Risk.”

Read more

Managed XDR Exposes Spear-Phishing Campaign Targeting Hospitality Industry Using RedLine Stealer

Credit to Author: Ryan Soliven| Date: Thu, 02 Mar 2023 00:00:00 +0000

Find out how the Managed XDR team uncovered RedLine Stealer’s evasive spear-phishing campaign that targets the hospitality industry.

Read more

Phishing as a Service Stimulates Cybercrime

Credit to Author: Jon Clay| Date: Thu, 02 Mar 2023 00:00:00 +0000

With phishing attacks at an all-time high, phishing as a service (PhaaS) is turning this once-skilled practice into a pay-to-play industry. Understanding the latest attack tactics is critical to improving your email security strategy.

Read more

Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting

Credit to Author: Daniel Lunghi| Date: Wed, 01 Mar 2023 00:00:00 +0000

We detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In this version, we also found components that enable the malware to compromise Linux systems.

Read more

Decrypting Cyber Risk Quantification

Credit to Author: Shannon Murphy| Date: Tue, 28 Feb 2023 00:00:00 +0000

Discover the evolution of cyber risk quantification, criteria for an accurate risk score, and its benefits across the organization.

Read more

Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool

Credit to Author: Buddy Tancio| Date: Fri, 24 Feb 2023 00:00:00 +0000

Trend Micro’s Managed Extended Detection and Response (MxDR) team discovered that a file called x32dbg.exe was used to sideload a malicious DLL we identified as a variant of PlugX.

Read more

In Review: What GPT-3 Taught ChatGPT in a Year

Credit to Author: Vincenzo Ciancaglini| Date: Tue, 21 Feb 2023 00:00:00 +0000

Amidst the uproar and opinions since November 2022, we look at the possibilities and implications of what OpenAI’s ChatGPT presents to the cybersecurity industry using a comparison to earlier products, like its predecessor GPT-3.

Read more

Royal Ransomware expands attacks by targeting Linux ESXi servers

Credit to Author: Nathaniel Morales| Date: Mon, 20 Feb 2023 00:00:00 +0000

Ransomware actors have been observed to expand their targets by increasingly developing Linux-based versions. Royal ransomware is following in the same path, a new variant targeting Linux systems emerged and we will provide a technical analysis on this variant in this blog.

Read more

Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack

Credit to Author: Joseph C Chen| Date: Fri, 17 Feb 2023 00:00:00 +0000

We discovered a new backdoor which we have attributed to the advanced persistent threat actor known as Earth Kitsune, which we have covered before. Since 2019, Earth Kitsune has been distributing variants of self-developed backdoors to targets, primarily individuals who are interested in North Korea.

Read more