Tag: Fortinet Threat Research Blog

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis.        This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis.        This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…

Ransomware Roundup – Lynx

Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare and energy sectors. Learn more.        This article has been…

Coyote Banking Trojan: A Stealthy Attack via LNK Files

FortiGuard Labs observes a threat actor using a LNK file to deploy Coyote attacks, unleashing malicious payloads and escalating the risk to financial cybersecurity.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Coyote…

Deep Dive Into a Linux Rootkit Malware

An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep Dive Into a…

Phish-free PayPal Phishing

An example of a recent phishing attempt and how to spot the obvious phishing tell-tales.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Phish-free PayPal Phishing

Catching “EC2 Grouper”- no indicators required!

Get detailed tactics associated with EC2 Grouper and how Lacework FortiCNAPP can be leveraged to detect this threat.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Catching “EC2 Grouper”- no indicators required!

Botnets Continue to Target Aging D-Link Vulnerabilities

FortiGuard Labs recently noticed that attackers still use and deliver two different botnets via D-Link exposing a HNAP interface weakness. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Botnets Continue to…

Analyzing Malicious Intent in Python Code: A Case Study

In this FortiGuard analysis, we examine the Python scripts behind two malicious packages, outline their behaviors, and provide insights into their potential impact.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Analyzing Malicious…

SmokeLoader Attack Targets Companies in Taiwan

FortiGuard Labs has uncovered an attack targeting companies in Taiwan with SmokeLoader, which performs its attack with plugins this time. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: SmokeLoader Attack Targets…

Fortinet Contributes to Major Cybercrime Operation Arrests

Fortinet contributes to major INTERPOL and AFRIPOL cybercrime operations arrests of members of cybercrime groups operating across Africa. These individuals specialize in ransomware, digital extortion, online scams, and Business Email Compromise (BEC) attacks.        This article has been indexed from…

New Campaign Uses Remcos RAT to Exploit Victims

See how threat actors have abused Remcos to collect sensitive information from victims and remotely control their computers to perform further malicious acts.        This article has been indexed from Fortinet Threat Research Blog Read the original article: New Campaign…

Threat Campaign Spreads Winos4.0 Through Game Application

FortiGuard Labs reveals a threat actor spreads Winos4.0, infiltrating gaming apps and targeting the education sector. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Threat Campaign Spreads Winos4.0 Through Game Application

Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401

When the GeoServer vulnerability CVE-2024-36401 emerged, the FortiGuard Labs gathered related intelligence. This blog highlights the threat actors and how they exploit and use the vulnerability.        This article has been indexed from Fortinet Threat Research Blog Read the original…

Emansrepo Stealer: Multi-Vector Attack Chains

FortiGuard Labs has uncovered a fresh threat – Emansrepo stealer, which is distributed via multiple attack chains for months. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Emansrepo Stealer: Multi-Vector Attack…