In 2020, Morphisec introduced the Jupyter infostealer, a .NET attack that primarily targets Chromium, Firefox, and Chrome browser data while also maintaining the additional capabilities of a backdoor.
Read More
Posted by
Nadav Lorber on September 21, 2021
Posted by
Nadav Lorber on May 7, 2021
Morphisec has recently monitored a highly sophisticated Crypter-as-a-Service that delivers numerous RAT families onto target machines.
The Crypter is most commonly delivered through phishing emails, which lead to the download of a visual basic...
Read More
Posted by
Nadav Lorber on March 16, 2021
During 2021 Morphisec identified an increased usage of the “HCrypt” crypter. In this post, we will lockpick “HCrypt” – a crypter as a service that is marketed as a FUD (fully undetectable) loader for the client`s RAT of choice. We chose to dissect...
Read More
Posted by
Nadav Lorber on February 5, 2021
Introduction
In this post, we will be covering CinaRAT loader`s evasive TTPs (tactics, techniques, and procedures) as have been identified and prevented by Morphisec’s zero-trust endpoint security solution, powered by moving target defense...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Moving Target Defense (116)
- Cyber Security News (115)
- Morphisec Labs (100)
- Threat Post (56)
- Threat Research (50)
- Morphisec News (49)
- Ransomware defense (5)
- zero trust architecture (3)
- Linux servers (2)
- advanced persistent threat (2)
- Mars Stealer (1)
- Microsoft Defender (1)
- NIST (1)
- SMB cybersecurity (1)
- SYK crypter (1)
- Virtual patching (1)
- healthcare cybersecurity (1)