Blog

Zeek for pcap files

Zeek for pcap files

I have only used inbuilt scripts or commands, or tools in REMnux virtual machine in my previous blogs. So, this time I am going to download a Zeek tool in REMnux and use it to analyze .pcap files. Zeek is a tool to examine the .pcap files, and this platform is free to utilize and

Read More
APT Used Commodity RATs to Take Advantage of a Geriatric Microsoft Bug – CVE-2017-11882

APT Used Commodity RATs to Take Advantage of a Geriatric Microsoft Bug – CVE-2017-11882

Threat actors are targeting entities in India and Afghanistan using malicious domains with political and government themes. A lone wolf threat actor is operating a crimeware campaign to get early access to high-value targets using a front company for future operations or monetary benefit. Malicious documents with dcRAT and QuasarRAT delivered CVE-2017-11882  for Windows CVE-2017-11882 

Read More
APT28 attack attempts against 14,000 Gmail users

APT28 attack attempts against 14,000 Gmail users

On 6th, Google has warned about 14,000 Gmail users that they’ve been targets of Russian government sponsored APT28 phishing campaign. “We detected an APT28 phishing campaign targeting a large volume of Gmail users (approx 14,000) across a wide variety of industries in late September,” Shane Huntley, Director of Google’s Threat Analysis Group, told The Record

Read More
GriftHorse Android Trojan Stole Millions from 10 Million Users

GriftHorse Android Trojan Stole Millions from 10 Million Users

More than 10 million Android users are being impacted by the new GriftHorse mobile virus. According to security experts, these typical premium service scams are using phishing techniques to make $41 every month per user by GriftHorse apps in all categories were discovered by Zimperium on Google Play and third-party app stores. GriftHorse, a Trojan

Read More