In 2020, Morphisec introduced the Jupyter infostealer, a .NET attack that primarily targets Chromium, Firefox, and Chrome browser data while also maintaining the additional capabilities of a backdoor.
Read More
Posted by
Nadav Lorber on September 21, 2021
Posted by
Nadav Lorber on May 7, 2021
Morphisec has recently monitored a highly sophisticated Crypter-as-a-Service that delivers numerous RAT families onto target machines.
The Crypter is most commonly delivered through phishing emails, which lead to the download of a visual basic...
Read More
Posted by
Nadav Lorber on March 16, 2021
In 2021 Morphisec identified increased usage of the “HCrypt” crypter. In this post, we lockpick “HCrypt”—a crypter as a service marketed as a FUD (fully undetectable) loader for the client's RAT of choice. We chose to dissect the crypter’s...
Read More
Posted by
Nadav Lorber on February 5, 2021
Introduction
In this post, we cover the CinaRAT loader's evasive tactics, techniques, and procedures (TTPs), as identified and prevented by Morphisec’s zero-trust endpoint security solution powered by Moving Target Defense technology.
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Moving Target Defense (128)
- Cyber Security News (123)
- Morphisec Labs (113)
- Threat Research (62)
- Threat Post (60)
- Morphisec News (52)
- Automated Moving Target Defense (10)
- Defense-in-Depth (6)
- in-memory attacks (6)
- Gartner (4)
- runtime attacks (4)
- Legacy security (3)
- Linux cyber security (3)
- advanced threat defense (3)
- threat and vulnerability management (3)
- ChatGPT (2)
- Evasive loader (2)
- Gartner endpoint protection (2)
- Ransomware (2)
- financial cybersecurity (2)
- patch management (2)
- Anti-tampering (1)
- Fileless malware (1)
- Gartner Emerging Tech (1)
- Healthcare cybersecurity (1)
- IoT security (1)
- Securing IoT devices (1)
- Server security (1)