Tag: Fortinet Threat Research Blog

Dissecting a Malicious Havoc Sample

Explore a detailed technical analysis of a Havoc Remote Access Trojan (RAT) variant used in a targeted cyberattack against Middle East critical national infrastructure. Learn how Fortinet detects and protects against Havoc-based threats.        This article has been indexed from…

Threat Group Targets Companies in Taiwan

FortiGuard Labs has uncovered an ongoing cyberattack, targeting companies in Taiwan using phishing emails disguised as tax-related communications. Read more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Threat Group Targets Companies in…

Deep Dive into a Dumped Malware without a PE Header

Explore manual deployment of a PE header-corrupted malware in a controlled environment, its C2 communication, and actions performed on a compromised device. Read more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep…

Ransomware Roundup – VanHelsing

The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Ransomware Roundup – VanHelsing

Horabot Unleashed: A Stealthy Phishing Threat

FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Horabot Unleashed: A Stealthy…

Horabot Unleashed: A Stealthy Phishing Threat

FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Horabot Unleashed: A Stealthy…