Malware Analysis – Supersuso
Supersuso is a ransomware intended to encrypt sensitive data in order to restrict access to it. During
Supersuso is a ransomware intended to encrypt sensitive data in order to restrict access to it. During
BigLock is a ransomware discovered in 2020 and also known as “corona-lock.” It encrypts
EXECUTIVE SUMMARY A critical Remote Code Execution Vulnerability tracked as CVE-2021-44228
Makop Ransomware Analysis Brief Introduction: Makop ransomware is the latest malware and is trending
KARMA Leak Ransomware Technical Analysis Risk Score: 8 Confidence Level: High Suspected Malware:
Malware Analysis related to APT41 – STEALTHVECTOR Risk Score: 8. Confidence Level: High. Suspected
Ongoing analysis of Gh0st RAT Blacklisted IP: 23[.]225.73.110 Risk Score: 10 Confidence Level: High
Overview Risk Score: 8 Confidence Level: High Suspected Malware: FormBook Malware/Trojan Function:
Malware Research on AtomSilo Ransomware AtomSilo is a new Ransomware recently seen in September 2021
By CYFIRMA Research First Published on 6 August 2021 EXECUTIVE SUMMARY REvil ransomware has set a
By CYFIRMA Research First Published on 6 August 2021 EXECUTIVE SUMMARY Russian threat actors are suspected
By CYFIRMA Research First Published on 6 August 2021 EXECUTIVE SUMMARY Russian threat actors are suspected
By CYFIRMA Research First Published on 27 Apr 2021 Following the coup in Myanmar by the country’s
By CYFIRMA Research First Published on 17 May 2021 Post Japanese government’s announcement to approve
By CYFIRMA Research Large-scale cyberattacks targeting critical infrastructure and operations is back
Out-of-Band Report 8 Mar 2021 Content 1. Executive Summary 2. Impact 3. Hypotheses 4. Process Flow
First published on 16 Dec 2020 A hacker has published a list of one-line exploits that can exfiltrate
Microsoft Teams could be targeted by suspected threat actors as they have been observed manipulating
Kimsuky (aka Velvet Chollima, Black Banshee, and Thallium) is a known N. Korean state-sponsored threat
CYFIRMA research first alerted clients on the increase in open proxy usage as the attack method by