Tag: Threat Hunting Content

Latest Zloader Campaign Abuses Microsoft Signature Verification
Latest Zloader Campaign Abuses Microsoft Signature Verification

Zloader (aka Terdot and DELoader) is raging worldwide, evading banking systems’ defenses. Not something one expects to find under their Christmas trees, especially accompanied by the calamitous Log4j Vulnerability, but these are some crazy times we live in. According to the researchers, Zloader attack routines are growing in scale and sophistication, adopting diversified techniques and […]

Read More
SysJoker Malware Detection
SysJoker Malware Detection

New Year, fresh start! And for threat actors as well. Meet a brand-new backdoor malware that has been increasingly hitting the cyber domain throughout the last couple of months. Dubbed SysJoker, the threat obtains powerful evasion capabilities while being able to target major operating systems, including Windows, Linux, and macOS. SysJoker Malware Analysis SysJocker malware […]

Read More
CVE-2021-45046, CVE-2021-44228 Detection: Vulnerabilities in Log4j Java Library
CVE-2021-45046, CVE-2021-44228 Detection: Vulnerabilities in Log4j Java Library

Yet another splitting headache for SOC teams — beware of the hottest Log4j vulnerability CVE-2021-45046! The cybersecurity world has just been shaken by an increasing amount of exploitation attempts for CVE-2021-44228, a critical zero-day vulnerability affecting the Apache Log4j Java logging library, while another high-severity Log4j RCE flaw tracked as CVE-2021-45046 comes on the scene.  […]

Read More
Detect CVE-2021-42287, CVE-2021-42278 Exploitation Сhain
Detect CVE-2021-42287, CVE-2021-42278 Exploitation Сhain

Adversaries have found a way to obtain full admin rights to the Active Directory (AD) domains by weaponizing CVE-2021-42287 and CVE-2021-42278 vulnerabilities. The nefarious exploitation chain enables Active Directory domain impersonation in just a couple of clicks. A batch of vulnerabilities tied to this exploitation chain drove the attention of security professionals in November 2021. […]

Read More
Detecting Grafana Zero-Day Vulnerability (CVE-2021-43798)
Detecting Grafana Zero-Day Vulnerability (CVE-2021-43798)

Brace yourself for the new zero-day vulnerability exploited in the wild. A recently-disclosed flaw affects Grafana, multi-platform open source analytics and interactive visualization app used by organizations globally to track and understand the metrics of their data. After the vulnerability details were occasionally leaked online, the multitude of proof-of-concept exploits spread over Twitter and GitHub, […]

Read More
Detecting CVE-2021-44515: Zero-Day in Zoho ManageEngine Desktop Central
Detecting CVE-2021-44515: Zero-Day in Zoho ManageEngine Desktop Central

Stay alert! Threat actors are actively leveraging the new zero-day vulnerability (CVE-2021-44515) in Zoho ManageEngine Desktop Central products to attack businesses worldwide. The flaw is a critical authentication bypass issue that enables hackers to gain unauthorized access and execute arbitrary code on vulnerable servers.  CVE-2021-44515 Description Zoho ManageEngine Desktop Central is a widely-used management utility […]

Read More
SOC Prime Launches Cyber Threat Intelligence Promo
SOC Prime Launches Cyber Threat Intelligence Promo

Cyber Monday is over, but not the hot deals from SOC Prime. In December 2021, we launch the Cyber Threat Intelligence Promo to break the limits on Community content views for SOC Prime users for the remainder of the year!  Powered by its Detection as Code Platform, SOC Prime curates Threat Detection Marketplace, the world’s […]

Read More
Detecting BlackByte Ransomware Attacks
Detecting BlackByte Ransomware Attacks

Another day —  another major challenge for security practitioners. Meet BlackByte, a new ransomware-as-a-service (RaaS) ring that is hard forging the way to the top of the threat list. First incidents attributed to the BlackByte collective were detected in July 2021, and since then adversaries evolved their tactics and tools significantly. Currently, security researchers observe […]

Read More
Babadeda Crypter Detection
Babadeda Crypter Detection

Meet Babadeda, a new notorious crypter in the arsenal of threat actors. The malware has been actively leveraged by adversaries since May 2021 to bypass security protections and covertly deliver a variety of threats to unsuspecting victims. Multiple infostealers and remote access Trojans (RATs) have been deployed with the help of Babadeda. Moreover, LockBit maintainers […]

Read More
The Future of Threat Detection is the Community
The Future of Threat Detection is the Community

Relying on Public Sources of Information Think about it — every time we open a blog post with the latest malware analysis, combing through it looking for the IoCs our threat teams so desperately need, – doesn’t it feel a bit lethargic? Fingers crossed, our favorite security vendor has already done the same, and the […]

Read More