Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise

Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to RiseThe covers of the Ransomware and Extortion Report and the MITRE ATT&CK Framework
7,816
people reacted

Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise

  • By Unit 42
  • March 21, 2023 at 2:00 AM

5

3 min. read

Finding Gozi: Unit 42 Wireshark Quiz, March 2023A pictorial representation of Wireshark traffic including a Gozi-like infection.
3,608
people reacted

Finding Gozi: Unit 42 Wireshark Quiz, March 2023

  • By Brad Duncan
  • March 24, 2023 at 6:00 AM

4

3 min. read

Trending

  • Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise by Unit 42
  • Tailoring Sandbox Techniques to Hidden Threats by Esmid Idrizovic
  • Malicious JavaScript Injection Campaign Infects 51k Websites by Brody Kutt
  • Finding Gozi: Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
Malicious JavaScript Injection Campaign Infects 51k WebsitesA pictorial representation of JavaScript poisoning.
7,671
people reacted

Malicious JavaScript Injection Campaign Infects 51k Websites

  • By Shehroze Farooqi, Billy Melicher, Brody Kutt and Alex Starov
  • March 23, 2023 at 6:00 AM

11

7 min. read

Tailoring Sandbox Techniques to Hidden ThreatsA pictorial representation of malware that can be combated with tailored sandbox techniques
8,102
people reacted

Tailoring Sandbox Techniques to Hidden Threats

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • March 20, 2023 at 6:00 AM

2

9 min. read

Bee-Ware of Trigona, An Emerging Ransomware StrainA pictorial representation of ransomware like Trigona. It shows an exchange of money for keys in front of a laptop screen.
16,529
people reacted

Bee-Ware of Trigona, An Emerging Ransomware Strain

  • By Frank Lee and Scott Roland
  • March 16, 2023 at 6:00 AM

20

18 min. read

GoBruteforcer: Golang-Based Botnet Actively Harvests Web ServersMalware conceptual image, covering variants such as GoBruter
25,870
people reacted

GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers

  • By Siddharth Sharma, Yang Ji, Anmol Maurya and Dongrui Zeng
  • March 10, 2023 at 6:00 AM

14

7 min. read

Spike in LokiBot Activity During Final Week of 2022A pictorial representation of malicious email like LokiBot where a stylized bug pops out of an envelope
26,274
people reacted

Spike in LokiBot Activity During Final Week of 2022

  • By Chris Navarrete, Edouard Bochin, Durgesh Sangvikar, Lei Xu and Yu Fu
  • March 3, 2023 at 6:00 AM

15

8 min. read

Subdomain Reputation: Detecting Malicious Subdomains of Public Apex DomainsA pictorial representation of a crybercriminal like those who execute attacks with subdomains. It shows a criminal opening a door on a laptop screen.
24,700
people reacted

Subdomain Reputation: Detecting Malicious Subdomains of Public Apex Domains

  • By Rebekah Houser and Daiping Liu
  • March 2, 2023 at 6:00 AM

3

10 min. read

Answers to Unit 42 Wireshark Quiz, February 2023A pictorial representation of packet capture. It also includes the Unit 42 and Palo Alto Networks logos.
27,144
people reacted

Answers to Unit 42 Wireshark Quiz, February 2023

  • By Brad Duncan
  • February 27, 2023 at 6:00 AM

9

15 min. read

Unit 42 Wireshark Quiz, February 2023A pictorial representation of packet capture. It also includes the Unit 42 and Palo Alto Networks logos.
31,869
people reacted

Unit 42 Wireshark Quiz, February 2023

  • By Brad Duncan
  • February 24, 2023 at 6:00 AM

17

4 min. read

Mirai Variant V3G4 Targets IoT DevicesA pictorial representation of the Mirai Variant V3G4
43,747
people reacted

Mirai Variant V3G4 Targets IoT Devices

  • By Chao Lei, Zhibin Zhang, Cecilia Hu and Aveek Das
  • February 15, 2023 at 6:00 AM

13

9 min. read

Machine Learning Versus Memory Resident EvilA pictorial representation of highly evasive malware, including sandbox evasion
48,784
people reacted

Machine Learning Versus Memory Resident Evil

  • By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim
  • January 31, 2023 at 6:00 AM

10

12 min. read

Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes PlatformsA pictorial representation of RBAC-based privilege escalation. Illustrated figures pilot a boat carrying the image of an anchor on a green shield.
51,395
people reacted

Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms

  • By Yuval Avrahami
  • January 27, 2023 at 6:00 AM

18

9 min. read

Chinese PlugX Malware Hidden in Your USB Devices?A conceptual image representing malware, including PlugX
67,560
people reacted

Chinese PlugX Malware Hidden in Your USB Devices?

  • By Mike Harbison and Jen Miller-Osborn
  • January 26, 2023 at 6:00 AM

14

12 min. read

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain ThreatsA pictorial representation of network attack trends such as CVE-2021-35394 featuring a stylized bug on IoT-related products. The Palo Alto Networks and Unit 42 logos are included.
59,468
people reacted

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats

  • By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi
  • January 24, 2023 at 6:00 AM

36

8 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.