Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Malware

Why LaZagne Makes D-Bus API Vigilance CrucialA pictorial representation of malware distributed via D-Bus API attacks. An open laptop against a dark background is flanked by exclamation points. On the laptop screen are overlapping windows with a bug icon representing the malware.
2,223
people reacted

Why LaZagne Makes D-Bus API Vigilance Crucial

  • By Siddharth Sharma
  • August 24, 2023 at 6:00 AM

6

6 min. read

NodeStealer 2.0 – The Python Version: Stealing Facebook Business AccountsA pictorial representation of an infostealer like NodeStealer. An open laptop against an orange background is flanked by exclamation points. On the laptop screen are overlapping windows with a bug icon representing the malware.
6,188
people reacted

NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts

  • By Lior Rochberger
  • August 1, 2023 at 6:00 AM

13

14 min. read

Trending

  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT by Robert Falcone
  • Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government by Robert Falcone
Diplomats Beware: Cloaked Ursa Phishing With a TwistA pictorial representation of threat group Cloaked Ursa as a bear head within a circle, overlaid by the Ursa constellation
11,137
people reacted

Diplomats Beware: Cloaked Ursa Phishing With a Twist

  • By Unit 42
  • July 12, 2023 at 3:00 AM

19

15 min. read

Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat ActorA pictorial representation of a threat actor implementing cryptojacking in a campaign like Manic Menagerie 2.0
16,439
people reacted

Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor

  • By Daniel Frank
  • June 28, 2023 at 6:00 AM

10

14 min. read

IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT ExploitsA pictorial representation of IoT vulnerabilities exploited by a Mirai variant. The Unit 42 logo.
32,317
people reacted

IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits

  • By Chao Lei, Zhibin Zhang, Yiheng An and Cecilia Hu
  • June 22, 2023 at 6:00 AM

13

11 min. read

Android Malware Impersonates ChatGPT-Themed ApplicationsA pictorial representation of Android malware impersonating ChatGPT
25,554
people reacted

Android Malware Impersonates ChatGPT-Themed Applications

  • By Lee Wei Yeong, Xingjiali Zhang, Yang Ji, Wenjun Hu and Royce Lu
  • June 15, 2023 at 6:00 AM

513

9 min. read

Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT DevicesA pictorial representation of a Mirai variant like IZ1H9. A green robot is surrounded by devices. The Palo Alto Networks and Unit 42 logo are included.
52,140
people reacted

Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices

  • By Chao Lei, Zhibin Zhang and Cecilia Hu
  • May 25, 2023 at 6:00 AM

14

8 min. read

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at ScaleA pictorial representation of malware configuration data such as that used by IcedID
66,624
people reacted

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale

  • By Mark Lim, Daniel Raygoza and Bob Jung
  • May 3, 2023 at 6:00 AM

5

9 min. read

Network Security Trends: November 2022-January 2023A pictorial representation of security vulnerability trending from November 2022 to January 2023
63,271
people reacted

Network Security Trends: November 2022-January 2023

  • By Yiheng An
  • May 2, 2023 at 6:00 AM

12

11 min. read

Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and MoreA pictorial representation of internet threat trends in the last half of 2022
65,345
people reacted

Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More

  • By Cecilia Hu, Fang Liu, Shehroze Farooqi, Stella Zhu, Daiping Liu, Jodie Ma, Jingwei Fan and Tao Yan
  • April 28, 2023 at 6:00 AM

17

10 min. read

Chinese Alloy Taurus Updates PingPull MalwareA pictorial representation of Alloy Taurus with a bull's head against the Taurus constellation in a night sky.
78,729
people reacted

Chinese Alloy Taurus Updates PingPull Malware

  • By Unit 42
  • April 26, 2023 at 3:00 AM

18

6 min. read

ChatGPT-Themed Scam Attacks Are on the RiseA pictorial representation of scam attacks like ChatGPT that also have the Unit 42 and Palo Alto Networks logo
89,048
people reacted

ChatGPT-Themed Scam Attacks Are on the Rise

  • By Peng Peng, Zhanhao Chen and Lucas Hu
  • April 20, 2023 at 3:00 AM

31

6 min. read

Threat Actors Rapidly Adopt Web3 IPFS TechnologyA pictorial representation of InterPlanetary File System being used as a malicious vehicle
76,976
people reacted

Threat Actors Rapidly Adopt Web3 IPFS Technology

  • By Amanda Tanner, Kristopher Bleich, Anthony Galiette and Joseph Opacki
  • April 19, 2023 at 6:00 AM

9

16 min. read

CryptoClippy Speaks PortugueseA pictorial representation of cryptojacking like CryptoClippy, where illustrated figures use pickaxes to dig out Bitcoin
74,854
people reacted

CryptoClippy Speaks Portuguese

  • By Veronika Senderovych, Amer Elsad and Anthony Galiette
  • April 5, 2023 at 3:00 AM

19

18 min. read

Malicious JavaScript Injection Campaign Infects 51k WebsitesA pictorial representation of JavaScript poisoning.
71,779
people reacted

Malicious JavaScript Injection Campaign Infects 51k Websites

  • By Shehroze Farooqi, Billy Melicher, Brody Kutt and Alex Starov
  • March 23, 2023 at 6:00 AM

24

7 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.