Category: Fortinet Threat Research Blog

Confucius Espionage: From Stealer to Backdoor

FortiGuard Labs has uncovered a shift in the tactics of threat actor Confucius, from stealers to Python backdoors, highlighting advanced techniques used in South Asian cyber espionage. Read more.        This article has been indexed from Fortinet Threat Research Blog…

SVG Phishing hits Ukraine with Amatera Stealer, PureMiner

A phishing campaign in Ukraine uses malicious SVG files to drop Amatera Stealer and PureMiner, enabling data theft and cryptomining. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: SVG Phishing hits…

MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access

FortiGuard Labs uncovers MostereRAT’s use of phishing, EPL code, and remote access tools like AnyDesk and TightVNC to evade defenses and seize full system control.        This article has been indexed from Fortinet Threat Research Blog Read the original article:…

MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access

FortiGuard Labs uncovers MostereRAT’s use of phishing, EPL code, and remote access tools like AnyDesk and TightVNC to evade defenses and seize full system control.        This article has been indexed from Fortinet Threat Research Blog Read the original article:…

Phishing Campaign Targeting Companies via UpCrypter

FortiGuard Labs uncovers a phishing campaign using fake emails and UpCrypter malware to deliver RATs like PureHVNC and DCRat across industries.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Phishing Campaign Targeting Companies…

From ClickFix to Command: A Full PowerShell Attack Chain

A regionally targeted PowerShell-based campaign used phishing lures, obfuscation, and RAT delivery to infiltrate Israeli organizations. Learn how the attack chain worked—and how Fortinet blocked it.        This article has been indexed from Fortinet Threat Research Blog Read the original…

Unveiling a New Variant of the DarkCloud Campaign

FortiGuard Labs has uncovered a stealthy new variant of DarkCloud malware that leverages phishing emails, obfuscated JavaScript, PowerShell loaders, and process hollowing to exfiltrate credentials, payment data, and email contacts—all without dropping a file to disk.        This article has…

Inside The ToolShell Campaign

FortiGuard Labs uncovers ToolShell, a sophisticated exploit chain targeting Microsoft SharePoint servers using a mix of patched and zero-day CVEs. Learn how attackers deploy GhostWebShell and KeySiphon for stealthy remote code execution and credential theft.        This article has been…

In-Depth Analysis of an Obfuscated Web Shell Script

Detailed analysis of an obfuscated web shell used in a CNI attack. Explores its structure, traffic patterns, and Fortinet’s detection and protection.        This article has been indexed from Fortinet Threat Research Blog Read the original article: In-Depth Analysis of…

A Special Mission to Nowhere

Following the Israel-Iran ceasefire, FortiGuard Labs uncovered a phishing campaign posing as a private jet evacuation service from Tel Aviv to New York. Learn how attackers used crisis-driven fear to steal personal and financial data.        This article has been…

NailaoLocker Ransomware’s “Cheese”

FortiGuard Labs analyzes NailaoLocker ransomware, a unique variant using SM2 encryption and a built-in decryption function. Learn how it works, why it matters, and how Fortinet protects against it.        This article has been indexed from Fortinet Threat Research Blog…

Old Miner, New Tricks

FortiCNAPP Labs uncovers Lcrypt0rx, a likely AI-generated ransomware variant used in updated H2Miner campaigns targeting cloud resources for Monero mining.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Old Miner, New Tricks