Josh Grunzweig

NexusLogger: A New Cloud-based Keylogger Enters the Market
March 15, 2017
Targeted Ransomware Attacks Middle Eastern Government Organizations for Political Purposes
March 8, 2017
menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations
February 16, 2017
Unique Office Loader Deploying Multiple Malware Families
February 10, 2017
DragonOK Updates Toolset and Targets Multiple Geographic Regions
January 5, 2017
SamSa Ransomware Attacks: A Year in Review
December 9, 2016
LabyREnth Capture the Flag (CTF): Random Track Solutions
October 6, 2016
OilRig Malware Campaign Updates Toolset and Expands Targets
October 4, 2016
LabyREnth Capture the Flag (CTF): Mobile Track Solutions
September 29, 2016
LabyREnth Capture the Flag (CTF): Windows Track 7-9 Solutions
September 22, 2016
LabyREnth Capture the Flag (CTF): Windows Track 1-6 Solutions
September 15, 2016
LabyREnth Capture the Flag (CTF): Threat Track Solutions
September 1, 2016
Aveo Malware Family Targets Japanese Speaking Users
August 16, 2016
Andromeda Botnet Targets Italy in Recent Spam Campaigns
July 18, 2016
Investigating the LuminosityLink Remote Access Trojan Configuration
July 8, 2016
Using IDAPython to Make Your Life Easier: Part 6
June 9, 2016
New Wekby Attacks Use DNS Requests As Command and Control Mechanism
May 24, 2016
Bucbi Ransomware Is Back With a Ukrainian Makeover
May 6, 2016
Python-Based PWOBot Targets European Organizations
April 19, 2016
Click-Fraud Ramdo Malware Family Continues to Plague Users
April 11, 2016
Evolution of SamSa Malware Suggests New Ransomware Tactics In Play
March 24, 2016
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
March 14, 2016
PowerSniff Malware Used in Macro-based Attacks
March 11, 2016
T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques
February 4, 2016
New Attacks Linked to C0d0so0 Group
January 22, 2016
Using IDAPython to Make Your Life Easier: Part 5
January 14, 2016
Using IDAPython to Make Your Life Easier: Part 4
January 6, 2016
Using IDAPython to Make Your Life Easier: Part 3
January 4, 2016
Using IDAPython to Make Your Life Easier: Part 2
December 30, 2015
Using IDAPython to Make Your Life Easier: Part 1
December 29, 2015
BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger
December 22, 2015
Inside TDrop2: Technical Analysis of new Dark Seoul Malware
November 23, 2015
TDrop2 Attacks Suggest Dark Seoul Attackers Return
November 18, 2015
CryptoWall v4 Emerges Days After Cyber Threat Alliance Report
November 5, 2015
Understanding and Preventing Point of Sale Attacks
October 28, 2015
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
October 9, 2015
Updated PClock Ransomware Still Comes Up Short
September 29, 2015
Banking Trojan Escelar Infects Thousands In Brazil and the US
August 27, 2015
Retefe Banking Trojan Targets Sweden, Switzerland and Japan
August 20, 2015
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor
July 20, 2015
Unit 42 Technical Analysis: Seaduke
July 14, 2015
REcon Recap: Here’s What Caught My Eye
July 2, 2015
Trapwot Scareware Activity Spikes in April
May 7, 2015
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
April 14, 2015
FindPOS: New POS Malware Family Discovered
March 19, 2015

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS