Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Brad Duncan

Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023A pictorial representation of Wireshark traffic including a Gozi-like infection.
5,972
people reacted

Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023

  • By Brad Duncan
  • March 27, 2023 at 6:00 AM

5

9 min. read

Finding Gozi: Unit 42 Wireshark Quiz, March 2023A pictorial representation of Wireshark traffic including a Gozi-like infection.
10,005
people reacted

Finding Gozi: Unit 42 Wireshark Quiz, March 2023

  • By Brad Duncan
  • March 24, 2023 at 6:00 AM

4

3 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
Answers to Unit 42 Wireshark Quiz, February 2023A pictorial representation of packet capture. It also includes the Unit 42 and Palo Alto Networks logos.
31,939
people reacted

Answers to Unit 42 Wireshark Quiz, February 2023

  • By Brad Duncan
  • February 27, 2023 at 6:00 AM

9

15 min. read

Unit 42 Wireshark Quiz, February 2023A pictorial representation of packet capture. It also includes the Unit 42 and Palo Alto Networks logos.
36,834
people reacted

Unit 42 Wireshark Quiz, February 2023

  • By Brad Duncan
  • February 24, 2023 at 6:00 AM

17

4 min. read

Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
48,755
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

8

6 min. read

Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
54,131
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

14

4 min. read

Flight of the Bumblebee: Email Lures and File Sharing Services Lead to MalwareConceptual image representing phishing, including the way Bumblebee malware is distributed, as discussed here
78,410
people reacted

Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware

  • By Brad Duncan
  • August 3, 2022 at 12:00 PM

56

8 min. read

Emotet Summary: November 2021 Through January 2022A conceptual image representing phishing - one of the primary delivery methods for Emotet malware, covered here.
47,545
people reacted

Emotet Summary: November 2021 Through January 2022

  • By Brad Duncan
  • May 17, 2022 at 6:00 AM

22

13 min. read

New Emotet Infection MethodA conceptual image representing phishing, such as the research on a new Emotet infection method covered here.
61,325
people reacted

New Emotet Infection Method

  • By Saqib Khanzada, Tyler Halfpop, Micah Yates and Brad Duncan
  • February 15, 2022 at 6:00 AM

23

5 min. read

Case Study: From BazarLoader to Network ReconnaissanceA conceptual image representing malware, such as the BazarLoader windows-based malware discussed here.
58,471
people reacted

Case Study: From BazarLoader to Network Reconnaissance

  • By Brad Duncan
  • October 18, 2021 at 6:00 AM

27

7 min. read

Wireshark Tutorial: Wireshark Workshop Videos Now AvailableA conceptual image representing Wireshark Tutorials.
75,773
people reacted

Wireshark Tutorial: Wireshark Workshop Videos Now Available

  • By Brad Duncan
  • October 1, 2021 at 6:00 AM

108

2 min. read

BazarCall Method: Call Centers Help Spread BazarLoader MalwareA conceptual image representing cybercrime, such as the way that BazarCall uses call centers for BazarLoader malware
65,453
people reacted

BazarCall Method: Call Centers Help Spread BazarLoader Malware

  • By Brad Duncan
  • May 19, 2021 at 4:00 PM

26

9 min. read

Wireshark Tutorial: Examining Traffic from Hancitor InfectionsA conceptual image representing Wireshark Tutorials.
55,783
people reacted

Wireshark Tutorial: Examining Traffic from Hancitor Infections

  • By Brad Duncan
  • April 7, 2021 at 6:00 AM

46

20 min. read

Hancitor’s Use of Cobalt Strike and a Noisy Network Ping ToolMalicious email, as depicted here, can be the starting point of a chain of events related to Hancitor infections, which have recently been observed distributing Cobalt Strike and using a noisy network ping tool.
49,228
people reacted

Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool

  • By Brad Duncan
  • April 1, 2021 at 12:00 PM

30

11 min. read

Wireshark Tutorial: Decrypting RDP TrafficA conceptual image representing Wireshark Tutorials.
76,086
people reacted

Wireshark Tutorial: Decrypting RDP Traffic

  • By Brad Duncan and Vijay Prakash
  • April 1, 2021 at 6:00 AM

45

10 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.