Estimated reading time: 4 minutes
The BFSI (Banking, Financial Services, and Insurance) sector has always been a prime target for cybercriminals. But today, the threat landscape has evolved beyond isolated attacks into a continuous, multi-layered assault on institutions, customers, and digital ecosystems. From phishing...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 17 minutes
Table of Contents: Introduction: Key Targets: Infection Chain: Initial Findings about Campaign: Analysis of Decoys: Technical Analysis: Campaign-1: Stage-1: Ho so.rar Campaign: 2 Stage-1: download.zip Stage-2: The LNK & Batch file (Common in 1 & 2 both) Stage-3: Analysis...
Estimated reading time: 9 minutes
Table of Content Introduction Key Targets Industries Affected Geographical focus Infection Chain Initial Findings Looking into the Decoy Documents Technical Analysis Stage 1 – Analysis of Malicious Executable Stage 2 – Second stage payload dropper Infrastructure & Attribution Conclusion...
Estimated reading time: 11 minutes
Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity Introduction During our investigation, we identified a multi-stage malware infection leveraging Scheduled Task persistence, VBScript launchers, and PowerShell-based execution. The attack operates through two parallel chains:...
Estimated reading time: 6 minutes
Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception Table of Contents: Introduction What is a Homoglyph Attack? Practical Homoglyph Confusable Practical Homoglyph Confusable Table Why Homoglyph Attacks Are Effective Common Homoglyph Use Cases and Attack Vectors Real-World...