Underground platforms are part of a mature ecosystem for trading cybercrime goods and services. How does a capable hosting infrastructure allow illicit activities to thrive?
Through investigation of recent cases, we have amassed more information on how Nefilim ransomware operates. Some notable updates are the use of other tools and the description of events that occur within the attack phases.
PowerShell's ubiquity has made it one of the most common tools cybercriminals abuse to perpetrate attacks and deliver fileless malware to systems. Here's how to track and defend against them.
We have come across a PowerShell script (mailer script) that distributes the Lemon Duck cryptominer through a new propagation method: Covid-19-themed emails with weaponized attachments.