Main phishing and scamming trends and techniques
Phishing in social networks and messengers, marketplace fraud, exploitation of Google Forms and other services: we uncover what’s trending among attackers in 2022
We want to familiarize the reader with the different stages of ransomware deployment and provide a visual guide to defending against targeted ransomware attacks.
This is our latest summary of advanced persistent threat (APT) activities, focusing on events that we observed during Q3 2022.
In the second part of this report, we discuss improvements made to the LODEINFO backdoor shellcode in 2022.
The first part of this report will provide technical analysis of the new infection methods such as SFX files and DOWNIISSA, a new downloader shellcode used to deploy the LODEINFO backdoor.
In this report we provide technical analysis of the GamePlayerFramework deployed by an APT we call DiceyF, which is targeting online casinos in Southeast Asia.