Tag: Fortinet Threat Research Blog

MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access

FortiGuard Labs uncovers MostereRAT’s use of phishing, EPL code, and remote access tools like AnyDesk and TightVNC to evade defenses and seize full system control.        This article has been indexed from Fortinet Threat Research Blog Read the original article:…

MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access

FortiGuard Labs uncovers MostereRAT’s use of phishing, EPL code, and remote access tools like AnyDesk and TightVNC to evade defenses and seize full system control.        This article has been indexed from Fortinet Threat Research Blog Read the original article:…

Phishing Campaign Targeting Companies via UpCrypter

FortiGuard Labs uncovers a phishing campaign using fake emails and UpCrypter malware to deliver RATs like PureHVNC and DCRat across industries.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Phishing Campaign Targeting Companies…

From ClickFix to Command: A Full PowerShell Attack Chain

A regionally targeted PowerShell-based campaign used phishing lures, obfuscation, and RAT delivery to infiltrate Israeli organizations. Learn how the attack chain worked—and how Fortinet blocked it.        This article has been indexed from Fortinet Threat Research Blog Read the original…

Unveiling a New Variant of the DarkCloud Campaign

FortiGuard Labs has uncovered a stealthy new variant of DarkCloud malware that leverages phishing emails, obfuscated JavaScript, PowerShell loaders, and process hollowing to exfiltrate credentials, payment data, and email contacts—all without dropping a file to disk.        This article has…

Inside The ToolShell Campaign

FortiGuard Labs uncovers ToolShell, a sophisticated exploit chain targeting Microsoft SharePoint servers using a mix of patched and zero-day CVEs. Learn how attackers deploy GhostWebShell and KeySiphon for stealthy remote code execution and credential theft.        This article has been…

In-Depth Analysis of an Obfuscated Web Shell Script

Detailed analysis of an obfuscated web shell used in a CNI attack. Explores its structure, traffic patterns, and Fortinet’s detection and protection.        This article has been indexed from Fortinet Threat Research Blog Read the original article: In-Depth Analysis of…

A Special Mission to Nowhere

Following the Israel-Iran ceasefire, FortiGuard Labs uncovered a phishing campaign posing as a private jet evacuation service from Tel Aviv to New York. Learn how attackers used crisis-driven fear to steal personal and financial data.        This article has been…

NailaoLocker Ransomware’s “Cheese”

FortiGuard Labs analyzes NailaoLocker ransomware, a unique variant using SM2 encryption and a built-in decryption function. Learn how it works, why it matters, and how Fortinet protects against it.        This article has been indexed from Fortinet Threat Research Blog…

Old Miner, New Tricks

FortiCNAPP Labs uncovers Lcrypt0rx, a likely AI-generated ransomware variant used in updated H2Miner campaigns targeting cloud resources for Monero mining.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Old Miner, New Tricks

Catching Smarter Mice with Even Smarter Cats

Explore how AI is changing the cat-and-mouse dynamic of cybersecurity, from cracking obfuscation and legacy languages to challenging new malware built with Flutter, Rust, and Delphi.        This article has been indexed from Fortinet Threat Research Blog Read the original…

NordDragonScan: Quiet Data-Harvester on Windows

FortiGuard Labs explores how NordDragonScan utilizes an effective distribution network for dissemination. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: NordDragonScan: Quiet Data-Harvester on Windows

DCRAT Impersonating the Colombian Government

Threat actor impersonates Colombian government to deliver DCRAT via phishing email, using obfuscation, steganography, and PowerShell payload chains.        This article has been indexed from Fortinet Threat Research Blog Read the original article: DCRAT Impersonating the Colombian Government

Dissecting a Malicious Havoc Sample

Explore a detailed technical analysis of a Havoc Remote Access Trojan (RAT) variant used in a targeted cyberattack against Middle East critical national infrastructure. Learn how Fortinet detects and protects against Havoc-based threats.        This article has been indexed from…