An Introduction to Operational Relay Box (ORB) Networks - Unpatched, Forgotten, and Obscured

An Introduction to Operational Relay Box (ORB) Networks – Unpatched, Forgotten, and Obscured

| | Threat Research
Although not a new concept, Operational Relay Box (ORB) networks—often referred to as "covert," "mesh," or "obfuscated" networks—are ... Read More
Insights into a “Cyber Attack” against the Venezuelan National Electoral Council

Insights into a “Cyber Attack” against the Venezuelan National Electoral Council

| | Internet Weather
About Team Cymru Internet weather reports Our Internet weather reports are intended to provide data and technical analysis of significant ... Read More
FIN7: The Truth Doesn't Need to be so STARK

FIN7: The Truth Doesn’t Need to be so STARK

| | Threat Research
First and foremost, our thanks go to the threat research team at Silent Push and the security team at Stark Industries Solutions ... Read More
Botnet 7777: Are You Betting on a Compromised Router?

Botnet 7777: Are You Betting on a Compromised Router?

| | Threat Research
Firstly, we extend our thanks to Chris Fearnley and Gi7w0rm, two threat researchers who assisted us behind the scenes with our ... Read More

Latrodectus: This Spider Bytes Like Ice

|
For this research, we partnered with Proofpoint’s Threat Research team in a collaborative effort to provide a comprehensive overview of ... Read More
Team Cymru: Internet Weather Report

Team Cymru: Internet Weather Report

Insights into Internet Outages along Africa's Western Coast About Team Cymru: Internet Weather Reports Our Internet weather reports are ... Read More
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs?

Coper / Octo – A Conductor for Mobile Mayhem… With Eight Limbs?

Analysis of an Android Malware-as-a-Service Operation Coper, a descendant of the Exobot malware family, was first observed in the wild in ... Read More
Visualizing Qakbot Infrastructure Part II: Uncharted Territory

Visualizing Qakbot Infrastructure Part II: Uncharted Territory

| | Threat Research
A Data-Driven Approach Based on Analysis of Network Telemetry In this blog post, we will provide an update on our high-level analysis of ... Read More
Inside the IcedID BackConnect Protocol (Part 2)

Inside the IcedID BackConnect Protocol (Part 2)

Introduction In this blog post, we will provide an update on our continued analysis and tracking of infrastructure associated with ... Read More
Darth Vidar: The Aesir Strike Back

Darth Vidar: The Aesir Strike Back

At the beginning of this year, we released a detailed publication on Vidar infrastructure, encompassing both the primary administrative ... Read More