A Unit 42 analysis of LockerGoga ransomware samples reveals that its developers have added new features to the malware, which was used in a string of attacks on industrial firms.
Through investigations into infrastructure used by HenBox malware, Unit 42 has discovered another malware family built for the more frequently-targeted Microsoft Windows operating system we named ‘Farseer’.
Redaman is banking malware first noted in 2015 that targets recipients who conduct transactions using Russian financial institutions. We have found versions of Redaman in Russian language mass-distribution campaigns during the last four months of 2018.
Unit 42 monitors the continued evolution Upatre and its anti-analysis Techniques.
Recently, Palo Alto Networks Unit 42 discovered the Tick group targeted a specific type of secure USB drive created by a South Korean defense company
Unit 42 goes inside the coop with new analysis and additional information on malicious HenBox applications
Unit 42 uncovers a new(ish) fully-featured Remote Access Tool (RAT), with web-based Command-and-Control (C2) included
Unit 42 discovers HenBox, an Android Malware family masquerading as legitimate apps on third-party app stores.
Unit 42 examines recent Sofacy group activities including multiple attacks to government entities.
Unit 42 demonstrates how using existing malware can enhance research efforts.