Yoroi

Researchers Disclosure Cisco ISE Broken Access Control Issue

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files.

Money Ransomware: The Latest Double Extortion Group

Researchers warned that the Money ransomware actors employ a human-operated intrusion approach, evidenced by the method of data exfiltration and the execution of the malware sample.

Hunting Cyber Evil Ratels: From the targeted attacks to the widespread usage of Brute Ratel

This Red Team framework is designed to be capable of being highly evasive and undetectable by security products, as demonstrated also by many shellcodes we intercepted through hunting activities with zero detection rate on VirusTotal platform.

Dissecting BlueSky Ransomware Payload

BlueSky is a ransomware firstly spotted in May 2022. The group behind the ransomware doesn’t adopt the double-extortion model and their targets are even normal users because the ransomware has been discovered inside cracks of programs and games.

On the FootSteps of Hive Ransomware

Inside the Hive group, there is surely a high-profile development team, with deep knowledge of programming in both newer and older languages as it wrote first versions of the encryptor in Golang and then switched to Rust starting from the v5 version.

Serverless InfoStealer delivered in Est European Countries

CERT Yoroi tracked the malware distribution infrastructure which was abusing the Bitbucket code repository infrastructures to evade detection mechanism, URL, and domain reputation security check.

Spectre v4.0: the speed of malware threats after the pandemics - Yoroi

While the first versions of this malware appeared in 2017, only during 2021 its developers heavily worked on the malware code. Three major version changes were observed just in the past few months.
September 24, 2021

Hunting the LockBit Gang's Exfiltration Infrastructures - Yoroi

During the last few months, the LockBit gang decided to develop and evolve a custom tool specialized in data exfiltration and used as a peculiar element to distinguish their criminal brand.

Financial Institutions in the Sight of New JsOutProx Attack Waves

Yoroi’s Malware ZLAB unit first discovered a complete new malware implant named “JsOutProx” (TH-264), a complex JavaScript-based RAT used to attack financial institutions in the APAC area in 2019.
June 30, 2021

The "WayBack” Campaign: a Large Scale Operation Hiding in Plain Sight

The campaign was designed to deliver over 900 pieces of malware with highly dangerous capabilities, enabling the threat actor to conduct both digital and environmental monitoring of their victims.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags