Tag: Threat Intel & Research
Total 7 Posts
Threat Intelligence and Research
ScenarioAn organization was hacked using the SQL injection and database access through its website. After penetrating the network and machine, the attacker created an account named “daemon” and then escalated the privileges to obtain more control of the network. Then the attacker injected a malware file called “hackit.exe” into
Introduction'BlackMatter' is a ransomware-as-a-service (RaaS) that first appeared in July 2021, when rumors began circulating that it was linked to the DarkSide attack. Those behind BlackMatter have announced that they have incorporated the best features of DarkSide, REvil, and LockBit. BlackMatter ransomware is gaining popularity and targeting high-profile targets in
In this article, we will discuss Conti Ransomware in detail. We’ll present our analysis results and the tactics, techniques, and procedures (TTP). Let's look at some interesting facts about vulnerabilities explored in the Conti Ransomware attack. IntroductionThe Conti is a ransomware-as-a-service (RaaS) operation believed to be controlled by a
What is Ransomware?Ransomware is malware that infects a computer, restricts users’ access to their device, and threatens to publish a victim's personal information, usually by encryption, to meet the demands. The motivation is typically monetary. Ransomware variants often attempt to extort money from victims by displaying an on-screen alert.
Authored by Morgan Fitzgerald & Co-Authored by Inno Eroraha, Founder & Chief Strategist, NetSecurity Corporation What is Cyber Threat Intelligence?Cyber Threat Intelligence is the enriched and aggregated knowledge of the cyber threats extracted by collecting, processing, and analyzing the data to understand and assess malicious threat actors' motives, intent,