Historical OSINT – International Institute For Counter-Terrorism Serving Malware – An Analysis

The International Institute For Counter-Terrorism is known to have served malicious software to its targeted user base back in 2013.In this post I’ll provide actionable intelligence behind the campaign and discuss in-depth the tactics technique and pro… Continue reading Historical OSINT – International Institute For Counter-Terrorism Serving Malware – An Analysis

Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation

Dear blog readers,It’s been a while since I’ve last posted a quality update and I’ve decided to share with everyone the results of a recent initiative where I aim to provide actionable threat intelligence on some of the key client-side exploits serving… Continue reading Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation

Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who’ve taken advantage of the opportunity to target victims with scams or malware campaigns.

Now, according to a new re… Continue reading Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

Uncovering threat infrastructure via URL, domain and IP address advanced pivots a.k.a. Netloc Intelligence

Quick links:https://support.virustotal.com/hc/en-us/articles/360001387057https://developers.virustotal.com/v3.0/reference#intelligence-searchhttps://github.com/VirusTotal/vt-pyTen years ago, VirusTotal launched VT Intelligence; a critical component of … Continue reading Uncovering threat infrastructure via URL, domain and IP address advanced pivots a.k.a. Netloc Intelligence

Maze Ransomware Exploiting Exploit Kits

Cybercrime has never been one to hem in tactics with ideology or rules. Rather, malware operators are known to use what works and then modify code to continue to work. By “work,” we mean that the code does what it is supposed to; for information steal… Continue reading Maze Ransomware Exploiting Exploit Kits