Gaps in Azure Service Fabric’s Security Call for User Vigilance

Credit to Author: David Fiser| Date: Wed, 21 Jun 2023 00:00:00 +0000

In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications.

Read more

Generative AI Assistant Makes Hunting Threats Faster

Credit to Author: Shannon Murphy| Date: Tue, 20 Jun 2023 00:00:00 +0000

Learn how analysts can search for threats with greater accuracy, speed, and effectiveness.

Read more

SeroXen Mechanisms: Exploring Distribution, Risks, and Impact

Credit to Author: Peter Girnus| Date: Tue, 20 Jun 2023 00:00:00 +0000

This is the third installment of a three-part technical analysis of the fully undetectable (FUD) obfuscation engine BatCloak and SeroXen malware. In this entry, we document the techniques used to spread and abuse SeroXen, as well as the security risks, impact, implications of, and insights into highly evasive FUD batch obfuscators.

Read more

Your New AI Assistant: Trend Vision One™ – Companion

Credit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000

Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.

Read more

Meet Your New AI Assistant: Introducing Trend Vision One™ – Companion

Credit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000

Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.

Read more

SeroXen Incorporates Latest BatCloak Engine Iteration

Credit to Author: Peter Girnus| Date: Thu, 15 Jun 2023 00:00:00 +0000

We looked into the documented behavior of SeroXen malware and noted the inclusion of the latest iteration of the batch obfuscation engine BatCloak to generate a fully undetectable (FUD) .bat loader. This is the second part of a three-part series documenting the abuse of BatCloak’s evasion capabilities and interoperability with other malware.

Read more

Behind the Scenes: Unveiling the Hidden Workings of Earth Preta

Credit to Author: Sunny Lu| Date: Wed, 14 Jun 2023 00:00:00 +0000

This blog entry discusses the more technical details on the most recent tools, techniques, and procedures (TTPs) leveraged by the Earth Preta APT group, and tackles how we were able to correlate different indicators connected to this threat actor.

Read more

Analyzing the FUD Malware Obfuscation Engine BatCloak

Credit to Author: Peter Girnus| Date: Fri, 09 Jun 2023 00:00:00 +0000

We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.

Read more

Impulse Team’s Massive Years-Long Mostly-Undetected Cryptocurrency Scam

Credit to Author: Cedric Pernet| Date: Tue, 06 Jun 2023 00:00:00 +0000

We have been able to uncover a massive cryptocurrency scam involving more than a thousand websites handled by different affiliates linked to a program called Impulse Project, run by a threat actor named Impulse Team.

Read more

Xollam, the Latest Face of TargetCompany

Credit to Author: Earle Maui Earnshaw| Date: Tue, 06 Jun 2023 00:00:00 +0000

This blog talks about the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. We also investigate previous variants’ behaviors and the ransomware family’s extortion scheme.

Read more