Publications

Welcome to the Weblog

Welcome to the Weblog. The world of malware is technically complex, full of incident and mal-innovations, and keeps growing. The computer underground is looking for new intrusion and infection technologies. On the other hand the anti-virus companies keep developing protection. The e-arms race goes on full speed. We are here to explain the details.

Welcome to the Weblog. Hackers have mastered social engineering, cheating, fraud and phishing. They want to watch you from inside of your computer – we are here to inform you about most “successful” ways they do that. We’ll help you to be more protected today, than yesterday.

Welcome to the Weblog. The software giant(s) are under attack. The complexity and flexibility of networks, operating systems and applications are searched and abused by the hackers, virus writers, spammers and advertisers. The vendors do their best to release patched products, to install new and better walls against the flow of malware. We are here to present our expertise about these changes.

Welcome to the Weblog. You’re looking for answers? You’re afraid of being hacked? Our ideas will help.

Welcome to the Weblog

Your email address will not be published.

 

Reports

Kimsuky’s GoldDragon cluster and its C2 operations

Kimsuky (also known as Thallium, Black Banshee and Velvet Chollima) is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea.

Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly.

Subscribe to our weekly e-mails

The hottest research right in your inbox