Key Learnings from Files Present on the C2 Server of an Infamous Infostealer Malware
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
Home » VirusTotal
This method can be applied to multiple other C2 servers that we come across on a daily basis to check for any security misconfigurations…
A ZIP/LNK payload and, with some luck, we will end up identifying the infostealer that is being dropped and its source code…
Hudson Rock’s data exploration capabilities allow for seamless analysis of massive amounts of assets associated with Infostealer infections. In this example, we analyze all domains
As of late August 2024, attackers have been using fraudulent “human verification” pages to trick users into executing a malicious PowerShell script. This blog post
Check out our latest interview featuring Leonid Rozenberg, where he speaks with Boris Agranovich on the Risk Management Show about the growing threat of Infostealers.
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.