Attack Analysis
Obfuscated VBScript Drops Zloader, Ursnif, Qakbot, Dridex
The Morphisec Labs team has tracked an obfuscated VBScript package in campaigns since March 2020. Initially, the malware campaign was focused on targets within Germany, but has since moved on to additional ...
ConnectWise Control Abused Again to Deliver Zeppelin Ransomware
In April 2019, attackers who breached IT supplier Wipro leveraged the ConnectWise Control (formerly ScreenConnect) remote desktop application as a major component of their attack ...
Nanocore Under the Microscope
In this blog, we will present some findings on how NanoCore RAT 1.2.2.0 is actively being delivered in new and different ways that we discovered at Morphisec Labs in the last couple ...
Security Alert: FIN8 is Back in Business, Targeting the Hospitality Industry
During the period of March to May 2019, Morphisec Labs observed a new, highly sophisticated variant of the ShellTea / PunchBuggy backdoor malware that attempted to infiltrate a number of machines within ...
A look at Hworm / Houdini AKA njRAT
Hworm/njRAT is a Remote Access Tool (RAT) that first appeared in 2013 in targeted attacks against the international energy industry, primarily in the Middle East. It was soon commoditized and is now ...
Inside the ASUS Supply chain attack
Introduction This week, Kaspersky Lab reported initial details of a new supply chain attack on systems by computer giant ASUS. Dubbed ShadowHammer by Kaspersky, the attack leveraged a malicious version of ASUS ...
New Global Attack on Point of Sale Systems
This post was authored by Michael Gorelik and Alon Groisman. Over the past 8-10 weeks, Morphisec has been tracking multiple sophisticated attacks targeting Point of Sale thin clients globally ...
Phone Motion Sensors: The New Attack Vector
Quite likely, this subterfuge attack, utilizing one of the more clever methods to evade detection to date, is the new attaque-du-jour ...
Proof(s)
Kevin Hartnett, Senior Writer at Quanta Magazine, expounds on the notion of formal code verification when utilzied to provide assurance of attack-proof code... Similar to unsinkable ocean liners, or truly attack-proof? Or, ...
Six Years The Lurker
Illustration from the Kaspersky Labs Document. Dan Goodin, writing at ArsTechnica, provides us with the surreptitious history of the malice-filled code-miscreant APT monikered Slingshot; of which, is apparently an alternatative mwthod of ...

