Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 2
26 résultats taggé sekoia  ✕
New RisePro Stealer distributed by the prominent PrivateLoader https://blog.sekoia.io/new-risepro-stealer-distributed-by-the-prominent-privateloader/
28/12/2022 11:36:48
QRCode
archive.org
thumbnail

PrivateLoader is an active malware in the loader market, used by multiple threat actors to deliver various payloads, mainly information stealer. Since our previous investigation, we keep tracking the malware to map its ecosystem and delivered payloads. Starting from this tria.ge submission, we recognized a now familiar first payload, namely PrivateLoader. However, the dropped stealer was not part of our stealer growing collection, notably including RedLine or Raccoon. Eventually SEKOIA.IO realised it was a new undocumented stealer, known as RisePro. This article aims at presenting SEKOIA.IO RisePro information stealer analysis.

sekoia EN 2022 PrivateLoader malware stealer RisePro analysis
Aurora: a rising stealer flying under the radar https://blog.sekoia.io/aurora-a-rising-stealer-flying-under-the-radar/
21/11/2022 20:56:10
QRCode
archive.org
thumbnail

Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.

sekoia 2022 EN infostealer malware technical analysis IoCs Malware-as-a-Service
Traffers: a deep dive into the information stealer ecosystem https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem/
31/08/2022 08:42:44
QRCode
archive.org
thumbnail

Traffers are responsible for redirecting user traffic to malicious content (malware, fraud, phishing, scam) exploited by other threat actors.

sekoia EN 2022 Traffers traffic web stealer
SEKOIA.IO Mid-2022 Ransomware Threat Landscape https://blog.sekoia.io/sekoia-io-mid-2022-ransomware-threat-landscape/
29/07/2022 09:02:45
QRCode
archive.org
thumbnail

SEKOIA.IO presents its Ransomware threat landscape for the first semester of 2022, with the following key points:

  • Ransomware victimology – recent evolutions
  • A busy first half of the year – several newcomers in the ransomware neighborhood
  • Cross-platform ransomware features trend
  • New extortion techniques
  • State-nexus groups carrying out ransomware campaigns
  • Ransomware threat groups’ Dark Web activities
  • A shift towards extortion without encryption?
sekoia EN 2022 ransomware threat landscape statistcs
Vice Society: a discreet but steady double extortion ransomware group https://blog.sekoia.io/vice-society-a-discreet-but-steady-double-extortion-ransomware-group/
15/07/2022 22:47:27
QRCode
archive.org
thumbnail

Vice Society is a little-known double extortion group that exfiltrates its victims' data and threatens its victims to leak their information.

sekoia EN 2022 vice-society extortion leak
Lapsus$: when kiddies play in the big league https://www.sekoia.io/en/lapsus-when-kiddies-play-in-the-big-league/
23/03/2022 18:05:52
QRCode
archive.org
thumbnail

You may not have missed all the noises recently caused by Lapsus$, a group that seems to specialize in extortion without necessarily leveraging ransomware.

At first glance, Lapsus$ check marks all elements that would make researchers put them in the low priority threats, especially considering their readiness to make dramas and OpSec failures. Except that the group has successfully managed to significantly enrich its victim list with high profile corporations, thus drawing all our attention.

In the following, we will describe the threat actor profile that was drawn by our investigations based either on OSINT, dark web or infrastructure analysis.

sekoia EN 2022 analysis Lapsus$ group
page 2 / 2
4719 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio