Jen Miller-Osborn

Jen Miller-Osborn

HenBox: Inside the Coop
April 26, 2018
HenBox: The Chickens Come Home to Roost
March 13, 2018
SunOrcal Adds GitHub and Steganography to its Repertoire, Expands to Vietnam and Myanmar
November 20, 2017
New Malware with Ties to SunOrcal Discovered
November 10, 2017
Updated KHRAT Malware Used in Cambodia Attacks
August 31, 2017
Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations
March 30, 2017
menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations
February 16, 2017
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy
November 22, 2016
Attack Delivers ‘9002’ Trojan Through Google Drive
July 26, 2016
Operation Ke3chang Resurfaces With New TidePool Malware
May 22, 2016
New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists
April 21, 2016
T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques
February 4, 2016
Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?
February 3, 2016
Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists
January 24, 2016
Attack on French Diplomat Linked to Operation Lotus Blossom
December 18, 2015
Connecting the Dots in Cyber Threat Campaigns, Part 1: Domain Name WHOIS Information
October 15, 2015
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
September 23, 2015
Musical Chairs: Multi-Year Campaign Involving New Variant of Gh0st Malware
September 8, 2015
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
April 14, 2015
Our Favorite Presentations from ShmooCon 2015
January 21, 2015
Tracking the WireLurker Arrests
November 17, 2014
The Question of WireLurker Attribution: Who Is Responsible?
November 10, 2014
New Indicators of Compromise for APT Group Nitro Uncovered
October 3, 2014
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
September 19, 2014
Bad Certificate Management in Google Play Store
August 28, 2014
Attacks on East Asia using Google Code for Command and Control
August 15, 2014

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

© 2018 Palo Alto Networks, Inc. All rights reserved.