The Rust Revolution: New Embargo Ransomware Steps In
Cyble analyzes the Rust-based Embargo ransomware, investigating its operations and possible variants.
The Rust Revolution: New Embargo Ransomware Steps In Read More »
Cyble analyzes the Rust-based Embargo ransomware, investigating its operations and possible variants.
The Rust Revolution: New Embargo Ransomware Steps In Read More »
CRIL analyses the darkweb marketplace’s deceptive practices, the recent arrest of an Incognito administrator, and the SuperMarket wallet heist.
CRIL analyzes the recent ransomware attack by Ransomhub on Industrial Control Systems and growing risks to critical infrastructure from ransomware groups.
Key Takeaways Overview CRIL identified a campaign utilizing malicious .LNK files masquerading as a PDF document. Upon execution, the .LNK file loads and displays a human rights seminar invitation as a lure document, suggesting that the threat actor targets individuals with a background or interest in human rights issues. We have also encountered a similar
Tiny BackDoor Goes Undetected – Suspected Turla leveraging MSBuild to Evade detection Read More »
The “Antidot” Android Banking Trojan masquerades as a Google Play Update app. It strategically targets Android users across various regions and employs VNC and Overlay techniques to harvest credentials.
New Antidot Android Banking Trojan Masquerading as Fake Google Play Updates Read More »
CRIL analyses the overlapping cyber strategies employed by Transparent Tribe and SideCopy APT groups targeting India.
The Overlapping Cyber Strategies of Transparent Tribe and SideCopy Against India Read More »