A Look Into Purple Fox’s Server Infrastructure

Credit to Author: Jay Yaneza| Date: Mon, 13 Dec 2021 00:00:00 +0000

By examining Purple Fox’s routines and activities, both with our initial research and the subject matter we cover in this blog post, we hope to help incident responders, security operation centers (SOCs), and security researchers find and weed out Purple Fox infections in their network.

Read more

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes

Credit to Author: Don Ovid Ladores| Date: Fri, 10 Dec 2021 00:00:00 +0000

We analyzed new samples of the Yanluowang ransomware. One interesting aspect of these samples is that the files are code-signed. They also terminate various processes which are related to database and backup management.

Read more

The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

Credit to Author: Veronica Chierzi| Date: Thu, 09 Dec 2021 00:00:00 +0000

In our study, we relied on the tactics, techniques, and procedures of MITRE ATT&CK to define the malware capabilities and characteristics of IoT Linux malware. We describe our findings and how IoT malware has been evolving.

Read more