Malware analysis

Google’s New XRefer Tool To Analyze More Complex Malware SamplesGoogle’s New XRefer Tool To Analyze More Complex Malware Samples

Google’s New XRefer Tool To Analyze More Complex Malware Samples

XRefer, an IDA Pro plugin, enhances binary analysis with a persistent companion view by employing Gemini-powered cluster analysis to decompose…

5 months ago
Sophisticated Celestial Stealer Targets Browsers to Steal Login CredentialsSophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with obfuscation and anti-analysis techniques, steals…

5 months ago
APT36 Hackers Attacking Windows Deevices With ElizaRATAPT36 Hackers Attacking Windows Deevices With ElizaRAT

APT36 Hackers Attacking Windows Deevices With ElizaRAT

APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware like ElizaRAT, which is designed for…

6 months ago
LummaC2 Stealer Leverages Customized Control Flow Indirection For ExecutionLummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

7 months ago
Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS TunnelingThreat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by…

8 months ago
New Custom Malware “Tickler” Attack Satellite DevicesNew Custom Malware “Tickler” Attack Satellite Devices

New Custom Malware “Tickler” Attack Satellite Devices

Microsoft identified a new custom multi-stage backdoor, "Tickler," deployed by the Iranian state-sponsored threat actor Peach Sandstorm between April and…

8 months ago
Pootry EDR Killer Malware Wipes Out Security Tools From Windows MachinePootry EDR Killer Malware Wipes Out Security Tools From Windows Machine

Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine

Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or…

8 months ago
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber AttacksHackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

9 months ago
New APT Actor240524 Weaponizing Official Documents To Deliver MalwareNew APT Actor240524 Weaponizing Official Documents To Deliver Malware

New APT Actor240524 Weaponizing Official Documents To Deliver Malware

A new APT group, dubbed Actor240524, launched a spear-phishing campaign targeting Azerbaijani and Israeli diplomats on July 1, 2024, where…

9 months ago
Beware Of Fake Browser Updates That Installs Malicious BOINC InfrastructreBeware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre

Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre

SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins…

10 months ago