Unbreakable encryption, a data leak site and threats of DDoS attacks, Avaddon has all the tricks of a modern RaaS. And now version 2 is on the way.
Browsing CategoryCrimeware
HelloKitty Ransomware Lacks Stealth, But Still Strikes Home
HelloKitty lacks the stealth of Ryuk, REvil and Conti, but has still struck some notable targets, including CEMIGO. Ransomware overview and IoCs here.
Zeoticus 2.0 | Ransomware With No C2 Required
Zeoticus is a Windows-specific ransomware that can execute fully offline with no callback to a C2, making network activity detection rules redundant.
Greyware’s Anatomy: The “Potentially Unwanted” are Upping Their Game
Adware infections may appear unremarkable at first, but in this example incident analysis we demonstrate their growing sophistication and risk.
Egregor RaaS Continues the Chaos with Cobalt Strike and Rclone
Egregor ransomware is one of the more aggressive and complex RaaS families to date, with password-protected payloads designed to evade analysis.
Ranzy Ransomware | Better Encryption Among New Features of ThunderX Derivative
The Ranzy ransomware operators have learned from their mistakes and adapted quickly after ThunderX decryptors became publicly available.
Anchor Project for Trickbot Adds ICMP
The team behind Trickbot has been aggressively updating and deploying various modules including Anchor and Bazar Loader targeting high-value targets, including healthcare entities
An Inside Look at How Ryuk Evolved Its Encryption and Evasion Techniques
Ryuk’s success is based partly on leveraging other toolkits and vulns, partly on its encryption speed and evasion tricks. We tear it down for a closer look.
Purple Fox EK | New CVEs, Steganography, and Virtualization Added to Attack Flow
New research shows that the Purple Fox exploit kit has added new tricks to its attack flow and continues to target vulnerable versions of Internet Explorer.
The FONIX RaaS | New Low-Key Threat with Unnecessary Complexities
FONIX RaaS uses four methods of encryption per file and leads victims (and affiliates) on a merry dance through multiple emails to obtain decryption.