Tag: Fortinet Threat Research Blog

Malicious NPM Packages Targeting PayPal Users

FortiGuard Labs has recently discovered a series of malicious NPM packages designed to steal sensitive information from compromised systems. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Malicious NPM Packages Targeting…

RolandSkimmer: Silent Credit Card Thief Uncovered

FortiGuard Labs recently observed a new wave of credit card skimming attacks leveraging malicious browser extensions across Chrome, Edge, and Firefox. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: RolandSkimmer: Silent…

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis.        This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant

Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger’s technique to evade detection and analysis.        This article has been indexed from Fortinet Threat Research Blog Read the original article: FortiSandbox 5.0…

Ransomware Roundup – Lynx

Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare and energy sectors. Learn more.        This article has been…

Coyote Banking Trojan: A Stealthy Attack via LNK Files

FortiGuard Labs observes a threat actor using a LNK file to deploy Coyote attacks, unleashing malicious payloads and escalating the risk to financial cybersecurity.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Coyote…

Deep Dive Into a Linux Rootkit Malware

An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Deep Dive Into a…

Phish-free PayPal Phishing

An example of a recent phishing attempt and how to spot the obvious phishing tell-tales.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Phish-free PayPal Phishing

Catching “EC2 Grouper”- no indicators required!

Get detailed tactics associated with EC2 Grouper and how Lacework FortiCNAPP can be leveraged to detect this threat.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Catching “EC2 Grouper”- no indicators required!

Botnets Continue to Target Aging D-Link Vulnerabilities

FortiGuard Labs recently noticed that attackers still use and deliver two different botnets via D-Link exposing a HNAP interface weakness. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Botnets Continue to…

Analyzing Malicious Intent in Python Code: A Case Study

In this FortiGuard analysis, we examine the Python scripts behind two malicious packages, outline their behaviors, and provide insights into their potential impact.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Analyzing Malicious…

SmokeLoader Attack Targets Companies in Taiwan

FortiGuard Labs has uncovered an attack targeting companies in Taiwan with SmokeLoader, which performs its attack with plugins this time. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: SmokeLoader Attack Targets…

Fortinet Contributes to Major Cybercrime Operation Arrests

Fortinet contributes to major INTERPOL and AFRIPOL cybercrime operations arrests of members of cybercrime groups operating across Africa. These individuals specialize in ransomware, digital extortion, online scams, and Business Email Compromise (BEC) attacks.        This article has been indexed from…