Josh Grunzweig

Josh Grunzweig

The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia
November 29, 2018
NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT
October 1, 2018
New KONNI Malware attacking Eurasia and Southeast Asia
September 27, 2018
The Gorgon Group: Slithering Between Nation State and Cybercrime
August 2, 2018
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
June 26, 2018
The Rise of the Cryptocurrency Miners
June 11, 2018
SquirtDanger: The Swiss Army Knife Malware from Veteran Malware Author TheBottle
April 17, 2018
Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent
March 7, 2018
Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency
March 5, 2018
Monero Miners Continue to Plague Users via Russian BitTorrent Site
March 1, 2018
Comnie Continues to Target Organizations in East Asia
January 31, 2018
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
January 26, 2018
Large Scale Monero Cryptocurrency Mining Operation using XMRig
January 24, 2018
SunOrcal Adds GitHub and Steganography to its Repertoire, Expands to Vietnam and Myanmar
November 20, 2017
New Malware with Ties to SunOrcal Discovered
November 10, 2017
Recent InPage Exploits Lead to Multiple Malware Families
November 2, 2017
Threat Actors Target Government of Belarus Using CMSTAR Trojan
September 28, 2017
Cardinal RAT Active for Over Two Years
April 20, 2017
Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations
March 30, 2017
NexusLogger: A New Cloud-based Keylogger Enters the Market
March 15, 2017
Targeted Ransomware Attacks Middle Eastern Government Organizations for Political Purposes
March 8, 2017
menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations
February 16, 2017
Unique Office Loader Deploying Multiple Malware Families
February 10, 2017
DragonOK Updates Toolset and Targets Multiple Geographic Regions
January 5, 2017
SamSa Ransomware Attacks: A Year in Review
December 9, 2016
LabyREnth Capture the Flag (CTF): Random Track Solutions
October 6, 2016
OilRig Malware Campaign Updates Toolset and Expands Targets
October 4, 2016
LabyREnth Capture the Flag (CTF): Mobile Track Solutions
September 29, 2016
LabyREnth Capture the Flag (CTF): Windows Track 7-9 Solutions
September 22, 2016
LabyREnth Capture the Flag (CTF): Windows Track 1-6 Solutions
September 15, 2016
LabyREnth Capture the Flag (CTF): Threat Track Solutions
September 1, 2016
Aveo Malware Family Targets Japanese Speaking Users
August 16, 2016
Andromeda Botnet Targets Italy in Recent Spam Campaigns
July 18, 2016
Investigating the LuminosityLink Remote Access Trojan Configuration
July 8, 2016
Using IDAPython to Make Your Life Easier: Part 6
June 9, 2016
New Wekby Attacks Use DNS Requests As Command and Control Mechanism
May 24, 2016
Bucbi Ransomware Is Back With a Ukrainian Makeover
May 6, 2016
Python-Based PWOBot Targets European Organizations
April 19, 2016
Click-Fraud Ramdo Malware Family Continues to Plague Users
April 11, 2016
Evolution of SamSa Malware Suggests New Ransomware Tactics In Play
March 24, 2016
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
March 14, 2016
PowerSniff Malware Used in Macro-based Attacks
March 11, 2016
T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques
February 4, 2016
New Attacks Linked to C0d0so0 Group
January 22, 2016
Using IDAPython to Make Your Life Easier: Part 5
January 14, 2016
Using IDAPython to Make Your Life Easier: Part 4
January 6, 2016
Using IDAPython to Make Your Life Easier: Part 3
January 4, 2016
Using IDAPython to Make Your Life Easier: Part 2
December 30, 2015
Using IDAPython to Make Your Life Easier: Part 1
December 29, 2015
BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger
December 22, 2015
Inside TDrop2: Technical Analysis of new Dark Seoul Malware
November 23, 2015
TDrop2 Attacks Suggest Dark Seoul Attackers Return
November 18, 2015
CryptoWall v4 Emerges Days After Cyber Threat Alliance Report
November 5, 2015
Understanding and Preventing Point of Sale Attacks
October 28, 2015
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
October 9, 2015
Updated PClock Ransomware Still Comes Up Short
September 29, 2015
Banking Trojan Escelar Infects Thousands In Brazil and the US
August 27, 2015
Retefe Banking Trojan Targets Sweden, Switzerland and Japan
August 20, 2015
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor
July 20, 2015
Unit 42 Technical Analysis: Seaduke
July 14, 2015
REcon Recap: Here’s What Caught My Eye
July 2, 2015
Trapwot Scareware Activity Spikes in April
May 7, 2015
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
April 14, 2015
FindPOS: New POS Malware Family Discovered
March 19, 2015

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

© 2019 Palo Alto Networks, Inc. All rights reserved.