Author: CloudSEK

Read our latest blog posts

Technical Analysis of the RedLine Stealer

Author: Anandeshwar Unnikrishnan Editor: Suchita Katira Summary RedLine is an information stealer which operates on a MaaS...

Continue reading

Technical Analysis of BlueSky Ransomware

BlueSky Ransomware is a modern malware using advanced techniques to evade security defences. It predominantly targets Windows...

Continue reading

Technical Analysis of MedusaLocker Ransomware

MedusaLocker is a ransomware family that appeared in September 2019 and was employed rapidly for attacks on...

Continue reading

Recordbreaker: The Resurgence of Raccoon

Researcher: Anandeshwar Unnikrishnan Editors: Suchita Katira & Hansika Saxena An info stealer is malicious software (malware) that...

Continue reading

Technical Analysis of Bumblebee Malware Loader

Malware loaders are essentially remote access trojans (RATs) that establish communication between the attacker and the compromised...

Continue reading

Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group

2021 saw an outbreak of ransomware groups and attacks that affected every major industry across the globe....

Continue reading

Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass

Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...

Continue reading

Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine

Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)

The blister is a code-signed malware that drops a malicious DLL file on the victim’s system, which...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading