Tag: Fortinet Threat Research Blog

Catching Smarter Mice with Even Smarter Cats

Explore how AI is changing the cat-and-mouse dynamic of cybersecurity, from cracking obfuscation and legacy languages to challenging new malware built with Flutter, Rust, and Delphi.        This article has been indexed from Fortinet Threat Research Blog Read the original…

NordDragonScan: Quiet Data-Harvester on Windows

FortiGuard Labs explores how NordDragonScan utilizes an effective distribution network for dissemination. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: NordDragonScan: Quiet Data-Harvester on Windows

DCRAT Impersonating the Colombian Government

Threat actor impersonates Colombian government to deliver DCRAT via phishing email, using obfuscation, steganography, and PowerShell payload chains.        This article has been indexed from Fortinet Threat Research Blog Read the original article: DCRAT Impersonating the Colombian Government

Dissecting a Malicious Havoc Sample

Explore a detailed technical analysis of a Havoc Remote Access Trojan (RAT) variant used in a targeted cyberattack against Middle East critical national infrastructure. Learn how Fortinet detects and protects against Havoc-based threats.        This article has been indexed from…

Threat Group Targets Companies in Taiwan

FortiGuard Labs has uncovered an ongoing cyberattack, targeting companies in Taiwan using phishing emails disguised as tax-related communications. Read more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Threat Group Targets Companies in…

Deep Dive into a Dumped Malware without a PE Header

Explore manual deployment of a PE header-corrupted malware in a controlled environment, its C2 communication, and actions performed on a compromised device. Read more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep…

Ransomware Roundup – VanHelsing

The VanHelsing ransomware was first identified in March 2025 and uses TOR sites for ransom negotiations and data leaks. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Ransomware Roundup – VanHelsing

Horabot Unleashed: A Stealthy Phishing Threat

FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Horabot Unleashed: A Stealthy…

Horabot Unleashed: A Stealthy Phishing Threat

FortiGuard Labs observed a phishing campaign “Horabot” resurfacing with a sophisticated multi-stage attack, blending phishing, credential theft, and propagation. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Horabot Unleashed: A Stealthy…

Key Takeaways from the 2025 Global Threat Landscape Report

Read into how the adversary advantage is accelerating, which means organizations must change how they measure and manage risk.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Key Takeaways from the 2025 Global…

Key Takeaways from the 2025 Global Threat Landscape Report

Read into how the adversary advantage is accelerating, which means organizations must change how they measure and manage risk.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Key Takeaways from the 2025 Global…

New Rust Botnet “RustoBot” is Routed via Routers

FortiGuard Labs recently discovered a new botnet propagating through TOTOLINK devices. Learn more about this malware targeting these devices.        This article has been indexed from Fortinet Threat Research Blog Read the original article: New Rust Botnet “RustoBot” is Routed…