FortiGuard Labs analyzes malicious software packages detected from November 2024 to the present and has identified various techniques used to exploit system vulnerabilities. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article:…
Tag: Fortinet Threat Research Blog
Havoc: SharePoint with Microsoft Graph API turns into FUD C2
ForitGuard Lab reveals a modified Havoc deployed by a ClickFix phishing campaign. The threat actor hides each stage behind SharePoint and also uses it as a C2. Learn more. This article has been indexed from Fortinet Threat Research Blog…
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan
FortiGuard Labs uncovers an attack targeting companies in Taiwan with WinOS4.0 that spreads via official email impersonation. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Winos 4.0 Spreads via Impersonation of…
FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant
Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis. This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…
FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant
Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis. This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…
Ransomware Roundup – Lynx
Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare and energy sectors. Learn more. This article has been…
Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst
FortiGuard Labs reverse engineers a malware’s binaries to look into what the malware is actually doing. This article has been indexed from Fortinet Threat Research Blog Read the original article: Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst
Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst
FortiGuard Labs reverse engineers a malware’s binaries to look into what the malware is actually doing. This article has been indexed from Fortinet Threat Research Blog Read the original article: Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst
Coyote Banking Trojan: A Stealthy Attack via LNK Files
FortiGuard Labs observes a threat actor using a LNK file to deploy Coyote attacks, unleashing malicious payloads and escalating the risk to financial cybersecurity. This article has been indexed from Fortinet Threat Research Blog Read the original article: Coyote…
Deep Dive Into a Linux Rootkit Malware
An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script. This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep Dive Into a…