New STRRAT RAT Phishing Campaign
![]()
FortiGuard Labs discovered a phishing email used to deliver a variant of the STRRAT malware as an attachment. This blog deconstructs the phishing email and its malicious payload.
![]()
FortiGuard Labs discovered a phishing email used to deliver a variant of the STRRAT malware as an attachment. This blog deconstructs the phishing email and its malicious payload.
![]()
Threat actors continue to maximize pandemic related social engineering lures. Read about a COVID Omicron variant related lure FortiGuard Labs discovered used to distribute RedLine Stealer malware.
![]()
FortiGuard Labs analyzes vulnerabilities in Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analysis shows that by combining them, it is possible for a regular user to easily impersonate a domain admin. Learn more about the exploitation of these vulnerabilities.
![]()
FortiGuard Labs provides important updates about the Apache Log4j vulnerabilities, including details, campaigns associated with Log4j, and an alleged “wormable” Mirai malware variant. Read to learn more.
![]()
FortiGuard Labs recently caught a phishing campaign that delivers a malicious PowerPoint file spreading a new variant of Agent Tesla. Read to learn more about the malicious macro, payload, and how the malware maintains persistence as well as how it exfiltrates stolen data and credentials.
![]()
FortiGuard Labs encountered a malware sample that’s currently being distributed in the wild targeting TP-link wireless routers. Learn more on MANGA aka Dark Mirai-based Campaign.
![]()
FortiGuard Labs analyzes how an attacker can leverage CVE-2021-36260 to create targets for Moobot which is a DDoS botnet based on Mirai. In this blog we explain how an attacker delivers this payload along with details of the botnet.
![]()
FortiGuard Labs predicts cyberattacks aimed at everything from crypto wallets to satellite internet in 2022 and beyond. Read more in our threat landscape predictions report.
![]()
FortiGuard Labs discovered a destructive malware that looks to be a joke program posing as a mysterious COVID-related installer. This new destructive malware variant is designed to simply render affected systems inoperable. Learn more about how it brings disaster to MBR.
![]()
FortiGuard Labs recently discovered a fresh variant of the Snake Keylogger malware. Learn how it is downloaded and executed through a captured Excel sample, what techniques this variant uses to protect it from being analyzed, and what sensitive information it steals from a victim’s machine.