• Tools
  • ATOMs
  • About Us

Posts tagged with: malware

A conceptual image representing malware, such as IronNetInjector, discussed in this blog, Turla's new malware loading tool.
14,692
people reacted

IronNetInjector: Turla’s New Malware Loading Tool

  • By Dominik Reichel
  • February 19, 2021 at 6:00 AM

26

10 min. read

This conceptual image illustrates cryptojacking, such as the WatchDog cryptojacking compaign discussed in this blog.
12,790
people reacted

WatchDog: Exposing a Cryptojacking Campaign That’s Operated for Two Years

  • By Nathaniel Quist
  • February 17, 2021 at 6:00 AM

9

16 min. read

Trending

  • COVID-19: Cloud Threat Landscape
  • SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes
  • Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
  • Threat Brief: Maze Ransomware Activities
  • COVID-19 Themed Malware Within Cloud Environments
BendyBear, conceptually illustrated here, is novel Chinese shellcode linked with cyber espionage group BlackTech.
28,476
people reacted

BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

  • By Mike Harbison
  • February 9, 2021 at 3:00 AM

55

16 min. read

20,970
people reacted

Pro-Ocean: Rocke Group’s New Cryptojacking Malware

  • By Aviv Sasson
  • January 28, 2021 at 6:00 AM

19

7 min. read

The conceptual image represents internet attack trends such as those discussed here, including scanner activities and HTTP directory traversal exploitation attempts.
18,119
people reacted

Network Attack Trends: Internet of Threats

  • By Yue Guan, Lei Xu, Ken Hsu and Zhibin Zhang
  • January 22, 2021 at 6:00 AM

14

8 min. read

The image represents malicious email campaigns, such as TA551, often push a variety of malware, such as Valak and IcedID.
25,230
people reacted

TA551: Email Attack Campaign Switches from Valak to IcedID

  • By Brad Duncan
  • January 7, 2021 at 12:01 AM

10

9 min. read

A conceptual image illustrating the concept of a cyberattack with widespread global effects, such as the suspected nation-state attack detailed in this SolarStorm timeline summary.
57,894
people reacted

SolarStorm Supply Chain Attack Timeline

  • By Unit 42
  • December 23, 2020 at 9:15 AM

59

11 min. read

Conceptual image illustrating the concept of malware, such as PyMICROPSIA, the malware family discussed here
28,218
people reacted

PyMICROPSIA: New Information-Stealing Trojan from AridViper

  • By Unit 42
  • December 14, 2020 at 6:00 AM

7

15 min. read

Cryptojacking is conceptually illustrated here. The category includes PGMiner, a new cryptocurrency mining botnet delivered via PostgreSQL.
26,953
people reacted

PGMiner: New Cryptocurrency Mining Botnet Delivered via PostgreSQL

  • By Xiao Zhang, Yang Ji, Jim Fitzgerald, Yue Chen and Claud Xiao
  • December 10, 2020 at 6:00 AM

10

9 min. read

This conceptual image illustrates the idea of malware, such as the njRAT spreading through active Pastebin command and control tunnel that is discussed in this blog.
18,973
people reacted

njRAT Spreading Through Active Pastebin Command and Control Tunnel

  • By Yanhui Jia, Chris Navarrete and Haozhe Zhang
  • December 9, 2020 at 6:00 AM

6

6 min. read

A conceptual illustration representing malware
20,900
people reacted

A Closer Look at the Web Skimmer

  • By Jin Chen, Tao Yan, Taojie Wang and Yu Fu
  • November 9, 2020 at 6:00 AM

11

7 min. read

The image illustrates the concept of ransomware, such as used by the threat group behind the Vatet loader, the PyXie remote access tool and the Defray777 ransomware
26,586
people reacted

When Threat Actors Fly Under the Radar: Vatet, PyXie and Defray777

  • By Ryan Tracey and Drew Schmitt
  • November 6, 2020 at 6:15 PM

39

26 min. read

This conceptual image illustrates the concept of ransomware, such as the Ryuk ransomware discussed in this article
27,727
people reacted

Threat Assessment: Ryuk Ransomware and Trickbot Targeting U.S. Healthcare and Public Health Sector

  • By Brittany Barbehenn, Doel Santos and Brad Duncan
  • October 29, 2020 at 5:45 PM

29

9 min. read

A conceptual image that illustrates the concepts of cybersquatting and domain parking, both of which can be abused by malicious actors to distribute malware, etc.
21,399
people reacted

Domain Parking: A Gateway to Attackers Spreading Emotet and Impersonating McAfee

  • By Ruian Duan, Zhanhao Chen, Seokkyung Chung, Janos Szurdi and Jingwei Fan
  • October 29, 2020 at 3:00 AM

15

11 min. read

This illustration represents the concept of malicious email, such as those involved in Emotet thread hijacking.
34,068
people reacted

Case Study: Emotet Thread Hijacking, an Email Attack Technique

  • By Brad Duncan
  • September 23, 2020 at 6:00 AM

16

5 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2021 Palo Alto Networks, Inc. All rights reserved.