In 2020, Morphisec introduced the Jupyter infostealer, a .NET attack that primarily targets Chromium, Firefox, and Chrome browser data while also maintaining the additional capabilities of a backdoor.
Read More
Posted by
Nadav Lorber on September 21, 2021
Posted by
Nadav Lorber on May 7, 2021
Morphisec has recently monitored a highly sophisticated Crypter-as-a-Service that delivers numerous RAT families onto target machines.
The Crypter is most commonly delivered through phishing emails, which lead to the download of a visual basic...
Read More
Posted by
Nadav Lorber on March 16, 2021
In 2021 Morphisec identified increased usage of the “HCrypt” crypter. In this post, we lockpick “HCrypt”—a crypter as a service marketed as a FUD (fully undetectable) loader for the client's RAT of choice. We chose to dissect the crypter’s...
Read More
Posted by
Nadav Lorber on February 5, 2021
Introduction
In this post, we cover the CinaRAT loader's evasive tactics, techniques, and procedures (TTPs), as identified and prevented by Morphisec’s zero-trust endpoint security solution powered by Moving Target Defense technology.
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (153)
- Cyber Security News (131)
- Threat Research (131)
- Morphisec Labs (120)
- Morphisec News (55)
- Defense-in-Depth (12)
- Adaptive Exposure Management (10)
- Gartner (10)
- Ransomware (9)
- Continuous Threat Exposure Management (CTEM) (8)
- In-Memory Attacks (7)
- Threat and Vulnerability Management (5)
- Advanced Threat Defense (4)
- Microsoft (4)
- Runtime Attacks (4)
- ChatGPT (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Financial Cybersecurity (3)
- Legacy Security (3)
- Linux Cybersecurity (3)
- Product Blogs (3)
- Artificial Intelligence (2)
- Healthcare Cybersecurity (2)
- Patch Management (2)
- Anti-tampering (1)
- Case Study (1)
- IoT Security (1)
- Managed Service Providers (1)
- Preemptive Security (1)
- Server Security (1)