Estimated reading time: 3 minutes
There’s something ironic about the construction industry. You’re in the business of building things that last, structures that withstand weather, load, and time. But when it comes to cybersecurity in the construction industry, most firms are running on borrowed...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 17 minutes
Table of Contents: Introduction: Key Targets: Infection Chain: Initial Findings about Campaign: Analysis of Decoys: Technical Analysis: Campaign-1: Stage-1: Ho so.rar Campaign: 2 Stage-1: download.zip Stage-2: The LNK & Batch file (Common in 1 & 2 both) Stage-3: Analysis...Estimated reading time: 9 minutes
Table of Content Introduction Key Targets Industries Affected Geographical focus Infection Chain Initial Findings Looking into the Decoy Documents Technical Analysis Stage 1 – Analysis of Malicious Executable Stage 2 – Second stage payload dropper Infrastructure & Attribution Conclusion...
Estimated reading time: 11 minutes
Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity Introduction During our investigation, we identified a multi-stage malware infection leveraging Scheduled Task persistence, VBScript launchers, and PowerShell-based execution. The attack operates through two parallel chains:...
Estimated reading time: 6 minutes
Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception Table of Contents: Introduction What is a Homoglyph Attack? Practical Homoglyph Confusable Practical Homoglyph Confusable Table Why Homoglyph Attacks Are Effective Common Homoglyph Use Cases and Attack Vectors Real-World...
Estimated reading time: 8 minutes
Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections Table of Contents Introduction The “Dual-Use Dilemma”: Why Attackers Prefer Legitimate Tools Why Antivirus Neutralization Matters Historical Evolution of Antivirus Neutralization The Ransomware Kill Chain Stages of Abusing Legitimate Low-Level...
Estimated reading time: 10 minutes
Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency Contents Introduction Target Phishing Email Infection Analysis Stage-1: JavaScript Loader Stage-2: Browser Stealer Infrastructure and Attribution CVE Assessment Conclusion Seqrite Coverage IOCs MITRE ATT&CK Introduction Seqrite Labs...