Unit 42 delves into how cybercriminals are treating stolen data like digital diamonds amid rising attacks and evolving extortion tactics. The post Data Is the New Diamond: Latest Moves by Hackers and Defenders appeared first on Unit 42. This article…
Tag: Unit 42
AdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks
AdaptixC2, an open-source C2 framework, is increasingly used in attacks. We discuss its features and potential use case scenarios. The post AdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks appeared first on Unit 42. This article has been indexed…
AdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks
AdaptixC2, an open-source C2 framework, is increasingly used in attacks. We discuss its features and potential use case scenarios. The post AdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks appeared first on Unit 42. This article has been indexed…
Data Is the New Diamond: Latest Moves by Hackers and Defenders
Unit 42 delves into how cybercriminals are treating stolen data like digital diamonds amid rising attacks and evolving extortion tactics. The post Data Is the New Diamond: Latest Moves by Hackers and Defenders appeared first on Unit 42. This article…
Why Threat Intelligence: A Conversation With Unit 42 Interns
Discover what it’s like to be a Threat Intelligence intern at Unit 42, from diving into research to tackling real-world cyber threats. The post Why Threat Intelligence: A Conversation With Unit 42 Interns appeared first on Unit 42. This article…
Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust
Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution. The post Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust appeared first on…
Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust
Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution. The post Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust appeared first on…
Why Threat Intelligence: A Conversation With Unit 42 Interns
Discover what it’s like to be a Threat Intelligence intern at Unit 42, from diving into research to tackling real-world cyber threats. The post Why Threat Intelligence: A Conversation With Unit 42 Interns appeared first on Unit 42. This article…
Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances
This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials. The post Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances appeared first on Unit 42. This article has been…
Data Is the New Diamond: Heists in the Digital Age
Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals. The post Data Is the New Diamond: Heists in the Digital Age appeared first on Unit 42. This article has been indexed from…
Data Is the New Diamond: Heists in the Digital Age
Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals. The post Data Is the New Diamond: Heists in the Digital Age appeared first on Unit 42. This article has been indexed from…
Insights: Telling You What We Really Think
Unit 42 introduces Insights, a new space for fresh thinking and varied content built on trusted expertise. The post Insights: Telling You What We Really Think appeared first on Unit 42. This article has been indexed from Unit 42 Read…
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
A campaign leverages CVE-2024-36401 to stealthily monetize victims’ bandwidth where legitimate software development kits (SDKs) are deployed for passive income. The post Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth appeared first on Unit 42. This…
Logit-Gap Steering: A New Frontier in Understanding and Probing LLM Safety
New research from Unit 42 on logit-gap steering reveals how internal alignment measures can be bypassed, making external AI security vital. The post Logit-Gap Steering: A New Frontier in Understanding and Probing LLM Safety appeared first on Unit 42. This…
Fashionable Phishing Bait: GenAI on the Hook
GenAI-created phishing campaigns misuse tools ranging from website builders to text generators in order to create more convincing and scalable attacks. The post Fashionable Phishing Bait: GenAI on the Hook appeared first on Unit 42. This article has been indexed…
A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
A beginner-friendly tutorial on analyzing .NET malware teaches you how to use common tools, recognize techniques and understand infection chains. The post A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode appeared first on Unit 42. This article has been indexed…
Muddled Libra’s Strike Teams: Amalgamated Evil
A look at the variance within Muddled Libra (aka Scattered Spider, Octo Tempest). Its lack of structure creates multiple teams with distinct skill sets. The post Muddled Libra’s Strike Teams: Amalgamated Evil appeared first on Unit 42. This article has…
Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
CVE-2025-32433 allows for remote code execution in sshd for certain versions of Erlang programming language’s OTP. We reproduced this CVE and share our findings. The post Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild…
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
DarkCloud Stealer’s delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in Visual Basic 6. The post New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer appeared first on Unit 42. This…
Muddled Libra: Why Are We So Obsessed With You?
Muddled Libra gets media attention due to its consistent playbook and unique use of vishing. The group’s English fluency is another major factor. The post Muddled Libra: Why Are We So Obsessed With You? appeared first on Unit 42. This…