New Immediate Threats!

Elke week worden er nieuwe cyberdreigingen en threats bekend in de wereld. Zodra een threat bekend is wordt deze door het Cymulate Research Lab geanalyseerd, gekopieerd en de angel eruit getrokken. Deze de-weaponized threat is binnen 48 uur beschikbaar om daarmee offensief de weerbaarheid van de beveiligingssystemen te testen. Zo weet je direct of de beveiligingsmaatregelen nog steeds adequaat zijn en welke rules je eventueel moet toepassen indien nodig.

New Immediate Threats is een onderdeel van het Cymulate platform.

Wil je daar meer over weten, een demo, of een try-out? Stuur je vraag naar udo.messack@cert2connect.com

Hieronder zie je de Immediate Threats van de afgelopen weken.

Cert2Connect

Immediate Threats

    • Cert IL Alert - GhostLocker latest activity

      GhostLocker is a ransomware strain written in Python compiled by an open-source project named Nuitka. The malware targets Windows devices and encrypts files under a specific and configurable directory path. Once running the malware Nuitka drops a .EXE file and multiple .PYD files in TEMP directory. The .EXE file contains the original malwares source code in Python encoded in base64 for obfuscation.

      Bekijk onze oplossing
    • Hackers use F5 BIG-IP Malware to Stealthily Steal Data for Years

      Sygnia analysts found that the Chinese cyberespionage group Velvet Ant utilized custom malware on F5 BIG-IP appliances to establish multiple footholds within the victims network.

      Bekijk onze oplossing
    • North Korean based backdoor packs a punch

      This report analyzes a new threat campaign discovered in late May featuring multiple layers and ultimately delivering a previously undocumented backdoor. The campaign specifically targets Aerospace and Defense companies sectors of particular interest to North Korean threat groups. The backdoors analyzed are simple yet powerful tools with various obfuscation techniques and capabilities like reconnaissance data collection and remote control. While attribution is made with low confidence to the Kimsuky threat group there are indications of multiple developers potentially involved including the possible outsourcing of some malware creation capabilities.

      Bekijk onze oplossing
    • DarkGate v6

      DarkGate version 6 received the biggest update since version 4, the main code has been modified, including the configuration, evasion techniques, and supported commands.

      Bekijk onze oplossing