Category: Fortinet Threat Research Blog

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis.        This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis.        This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…

Ransomware Roundup – Lynx

Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare and energy sectors. Learn more.        This article has been…

Coyote Banking Trojan: A Stealthy Attack via LNK Files

FortiGuard Labs observes a threat actor using a LNK file to deploy Coyote attacks, unleashing malicious payloads and escalating the risk to financial cybersecurity.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Coyote…

Deep Dive Into a Linux Rootkit Malware

An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep Dive Into a…