Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Alex Hinchliffe

Threat Assessment: BlackCat RansomwareA conceptual image representing ransomware, such as the BlackCat ransomware discussed here.
75,880
people reacted

Threat Assessment: BlackCat Ransomware

  • By Amanda Tanner, Alex Hinchliffe and Doel Santos
  • January 27, 2022 at 6:00 AM

60

10 min. read

THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG GroupA conceptual image representing THOR, a previously unseen PlugX variant deployed by the PKPLUG Group. The image features a Panda because PKPLUG is also known as Mustang Panda. It also features the logos of Palo Alto Networks and Unit 42.
78,043
people reacted

THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group

  • By Mike Harbison and Alex Hinchliffe
  • July 27, 2021 at 12:00 PM

53

13 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
Mespinoza Ransomware Gang Calls Victims “Partners,” Attacks with Gasket, "MagicSocks" ToolsMespinoza ransomware gang
49,721
people reacted

Mespinoza Ransomware Gang Calls Victims “Partners,” Attacks with Gasket, "MagicSocks" Tools

  • By Robert Falcone, Alex Hinchliffe and Quinn Cooke
  • July 15, 2021 at 3:00 AM

20

23 min. read

Threat Assessment: WastedLocker RansomwareConceptual image illustrating WastedLocker ransomware
43,232
people reacted

Threat Assessment: WastedLocker Ransomware

  • By Alex Hinchliffe, Doel Santos, Adrian McCabe and Robert Falcone
  • July 30, 2020 at 6:00 AM

30

4 min. read

Threat Assessment: EKANS Ransomware
43,424
people reacted

Threat Assessment: EKANS Ransomware

  • By Alex Hinchliffe and Doel Santos
  • June 26, 2020 at 6:00 AM

19

5 min. read

Threat Assessment: Hangover Threat Group
27,816
people reacted

Threat Assessment: Hangover Threat Group

  • By Doel Santos and Alex Hinchliffe
  • June 3, 2020 at 7:00 PM

22

8 min. read

Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
79,638
people reacted

Updated BackConfig Malware Targeting Government and Military Organizations in South Asia

  • By Alex Hinchliffe and Robert Falcone
  • May 11, 2020 at 9:30 PM

20

16 min. read

Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations
49,020
people reacted

Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations

  • By Robert Falcone, Bryan Lee and Alex Hinchliffe
  • March 3, 2020 at 6:00 AM

42

28 min. read

PKPLUG: Chinese Cyber Espionage Group Attacking Southeast Asia
76,210
people reacted

PKPLUG: Chinese Cyber Espionage Group Attacking Southeast Asia

  • By Alex Hinchliffe
  • October 3, 2019 at 6:00 AM

33

11 min. read

DNS Tunneling: how DNS can be (ab)used by malicious actors
148,841
people reacted

DNS Tunneling: how DNS can be (ab)used by malicious actors

  • By Alex Hinchliffe
  • March 15, 2019 at 9:00 AM

36

11 min. read

Farseer: Previously Unknown Malware Family bolsters the Chinese armoury

  • By Alex Hinchliffe and Mike Harbison
  • February 26, 2019 at 6:00 AM

11

10 min. read

42,704
people reacted

HenBox: Inside the Coop

  • By Alex Hinchliffe, Mike Harbison, Jen Miller-Osborn and Tom Lancaster
  • April 26, 2018 at 5:00 AM

18

19 min. read

52,996
people reacted

HenBox: The Chickens Come Home to Roost

  • By Alex Hinchliffe, Mike Harbison, Jen Miller-Osborn and Tom Lancaster
  • March 13, 2018 at 5:00 AM

8

18 min. read

48,007
people reacted

Updated KHRAT Malware Used in Cambodia Attacks

  • By Alex Hinchliffe and Jen Miller-Osborn
  • August 31, 2017 at 5:00 AM

7

15 min. read

34,678
people reacted

EMEA Bi-Monthly Threat Reports: Turkey, Saudi Arabia & United Arab Emirates

  • By Alex Hinchliffe
  • July 10, 2017 at 5:00 AM

63

18 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.