Brad Duncan

Brad Duncan

Fake Flash Updaters Push Cryptocurrency Miners
October 11, 2018
Customizing Wireshark – Changing Your Column Display
August 16, 2018
Malware Team Up: Malspam Pushing Emotet + Trickbot
July 18, 2018
Rig EK One Year Later: From Ransomware to Coin Miners and Information Stealers
February 26, 2018
Compromised Servers & Fraud Accounts: Recent Hancitor Attacks
February 7, 2018
Master Channel: The Boleto Mestre Campaign Targets Brazil
December 7, 2017
EITest: HoeflerText Popups Targeting Google Chrome Users Now Push RAT Malware
September 1, 2017
Malspam Targeting Brazil Continues to Evolve
July 21, 2017
Decline in Rig Exploit Kit
June 21, 2017
Mole Ransomware: How One Malicious Spam Campaign Quickly Increased Complexity and Changed Tactics
April 25, 2017
“Blank Slate” Campaign Takes Advantage of Hosting Providers to Spread Ransomware
March 2, 2017
Campaign Evolution: EITest from October through December 2016
January 12, 2017
Campaign Evolution: pseudo-Darkleech in 2016
December 30, 2016
EITest Campaign Evolution: From Angler EK to Neutrino and Rig
October 3, 2016
Afraidgate: Major Exploit Kit Campaign Switches from CryptXXX Ransomware Back to Locky
July 29, 2016
CryptoBit: Another Ransomware Family Gets an Update
July 7, 2016
Understanding Angler Exploit Kit – Part 2: Examining Angler EK
June 7, 2016
Understanding Angler Exploit Kit – Part 1: Exploit Kit Fundamentals
June 3, 2016
Afraidgate: Major Exploit Kit Campaign Swaps Locky Ransomware for CryptXXX
April 28, 2016
How the EITest Campaign’s Path to Angler EK Evolved Over Time
March 31, 2016
Campaign Evolution: Darkleech to Pseudo-Darkleech and Beyond
March 22, 2016
Locky Ransomware Installed Through Nuclear EK
March 21, 2016

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

© 2019 Palo Alto Networks, Inc. All rights reserved.