Malware Analysis

Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks have been noteworthy We ve discussed the first incident that involves the BlackCat Ransomware as a Service RaaS Now let s continue with the second the return of LockBit 3 0 Part 3 Rhysida Another

Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks have been noteworthy We ve discussed the first incident that involves the BlackCat Ransomware as a Service RaaS Now let s continue with the second the return of LockBit 3 0 Part 2 The End

Ransomware One word that keeps many IT Administrators and SOC Analysts awake at night And when it comes to the healthcare industry the recent ransomware attacks of 2024 have led many IT security practitioners to burn the midnight oil late into the night Three Ransomware attacks and data breaches in

Overview Pikabot has posed significant challenges to many Endpoint Detection and Response EDR systems through its employment of an advanced technique to hide its malicious activities known as indirect system calls or indirect syscalls This is only one of multiple techniques this family employs to evade detection Pikabot distinguishes itself

In the wake of the shocking AnyDesk incident a critical question lingers are we equipped to handle the ever evolving threat of signature exploiting malware Let s delve deep into the complexities of post breach detection and uncover the cutting edge strategies needed to stay ahead of these sophisticated threats
Join us as we explore the malicious tactics and activities of the DarkGate malware family

Family Overview Beginning November 2022 here at VMRay we noticed increased activity of the Amadey information stealer malware Monitoring of the threat landscape over the past several months showed this trend in the malware activity continued and the family is active as we speak Our observations together with public reports

Download The Report Introduction Having meticulously dissected the intricate delivery methods employed by BumbleBee in our previous blog post we embarked on a journey through the multifaceted and complex delivery chains that enable its stealthy penetration From the covert utilization of seemingly innocuous files to ingenious tactics that evade detection

Explore BumbleBee malware s configuration secrets and discover the interconnected web of its malicious operations in this in depth analysis

BumbeBee loader an overview In March of 2022 a new loader equipped with more than 50 evasion techniques was spotted in the wild BumbleBee employs a variety of methods to escape detection from complex delivery chains and hooking based loading to iterating through a collection of evasion techniques to detect

Uncover the truth of Cybersecurity, one story at a time

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!

Subscribe to our Newsletter