Explore a detailed technical analysis of a Havoc Remote Access Trojan (RAT) variant used in a targeted cyberattack against Middle East critical national infrastructure. Learn how Fortinet detects and protects against Havoc-based threats. This article has been indexed from…
Category: Fortinet Threat Research Blog
Threat Group Targets Companies in Taiwan
FortiGuard Labs has uncovered an ongoing cyberattack, targeting companies in Taiwan using phishing emails disguised as tax-related communications. Read more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Threat Group Targets Companies in…
How a Malicious Excel File (CVE-2017-0199) Delivers the FormBook Payload
Read how a malicious Excel file exploits CVE-2017-0199 to deliver FormBook malware via phishing. This article has been indexed from Fortinet Threat Research Blog Read the original article: How a Malicious Excel File (CVE-2017-0199) Delivers the FormBook Payload
Deep Dive into a Dumped Malware without a PE Header
Explore manual deployment of a PE header-corrupted malware in a controlled environment, its C2 communication, and actions performed on a compromised device. Read more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep…
Infostealer Malware FormBook Spread via Phishing Campaign – Part II
Learn how the FormBook payload operates on a compromised machine, including the complicated anti-analysis techniques employed by this variant. This article has been indexed from Fortinet Threat Research Blog Read the original article: Infostealer Malware FormBook Spread via Phishing…
Ransomware Roundup – VanHelsing
The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Ransomware Roundup – VanHelsing
Horabot Unleashed: A Stealthy Phishing Threat
FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Horabot Unleashed: A Stealthy…
Horabot Unleashed: A Stealthy Phishing Threat
FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Horabot Unleashed: A Stealthy…
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware
FortiGuard Labs highlights a malware campaign’s increasing sophistication of attack methodologies, leveraging the legitimate functionalities of remote administration tools for malicious purposes. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Multilayered…
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure
The FortiGuard Incident Response (FGIR) team recently investigated a long-term cyber intrusion targeting critical national infrastructure (CNI) in the Middle East, attributed to an Iranian state-sponsored threat group. This article has been indexed from Fortinet Threat Research Blog Read…