Category: Threats

Community Content

Emotet Malware

OVERVIEW Emotet is a pervasive and modular credential theft trojan which has historically been leveraged by threat actors in order to collect usernames and passwords

Read More »
Maldoc
Community Content

Maldoc Execution Chain

THREAT DESCRIPTION – MALDOC Maldoc (Malicious Documents) are documents containing self-executing code or code that requires a user to grant permission or interact with the

Read More »
Community Content

DeadRinger Operation

DeadRinger Summary The DeadRinger operation was comprised of three campaigns led by different threat groups linked to China, targeting major Telecommunications Companies in Southeast Asia.

Read More »
Community Content

Macaw Ransomware

OVERVIEW Macaw or Macaw Locker is a ransomware malware that first came to prominence in October 2021 when it was used to attack a Olympus

Read More »
Community Content

njRAT Remote Access Trojan

OVERVIEW njRAT is a well-known and widely available Remote Administration Tool (RAT) which has been observed since 2013 and may have been in development as

Read More »
Community Content

Meteor Wiper

OVERVIEW The Meteor or Meteor Express malware variant was first seen when the Iranian railway system and the Ministry of Roads and Urban Development system

Read More »
Community Content

Sibot Malware

OVERVIEW The Sibot malware is a malware family implemented in Visual Basic. It is used to establish persistence on a system, as well as downloading

Read More »
Community Content

TEARDROP Dropper Malware

OVERVIEW TEARDROP is fileless malware that functions as a dropper. The malware, which was first observed in late 2020, was observed as part of the

Read More »
Community Content

BoomBox Downloader

OVERVIEW BoomBox is a malicious downloader used by the actor known as Dark Halo (aka NOBELLIUM, UNC2452). DELIVERY The malware (named after the original file

Read More »