ReversingLabs » Malware
127 FOLLOWERS
This category is about Malware, Ransomeware, and ways to protect the system from malware infection. ReversingLabs delivers the Software Supply Chain Security platform for dev and SOC teams, empowering modern software development and security operations center teams to protect their software releases and organizations from sophisticated software supply chain security attacks, malware,..
ReversingLabs » Malware
1y ago
The fast-evolving story of the compromise of voice over IP (VoIP) provider 3CX has refocused attention on the threat that software supply chain compromises pose. State-sponsored hackers tampered with 3CX’s desktop client, compromising the company’s Windows and macOS build environments, and added a backdoor to the desktop client’s code. The update was then signed and pushed to customers.
That — and more recent revelations that 3CX itself was compromised by a signed, but compromised application made by Trading Technologies — is all the proof software development teams need that their deve ..read more
ReversingLabs » Malware
1y ago
ReversingLabs recently discovered instances of the AstraLocker 2.0 malware distributed directly from Microsoft Word files used in phishing attacks.
Executive Summary
ReversingLabs recently discovered of a new version of the AstraLocker ransomware (AstraLocker 2.0) that was being distributed directly from Microsoft Office files used as bait in phishing attacks. Our analysis suggests that the threat actor responsible for this campaign likely obtained the underlying code for AstraLocker 2.0 from a leak of the Babuk ransomware in September 2021. Links between the two campaigns include shared code ..read more
ReversingLabs » Malware
1y ago
ReversingLabs recently discovered instances of the AstraLocker 2.0 malware distributed directly from Microsoft Word files used in phishing attacks.
Executive Summary
ReversingLabs recently discovered of a new version of the AstraLocker ransomware (AstraLocker 2.0) that was being distributed directly from Microsoft Office files used as bait in phishing attacks. Our analysis suggests that the threat actor responsible for this campaign likely obtained the underlying code for AstraLocker 2.0 from a leak of the Babuk ransomware in September 2021. Links between the two campaigns include shared code ..read more
ReversingLabs » Malware
1y ago
In a security leader roundtable at RSA Conference, experts share insights on taking a zero-trust approach in the age of 'hyperconnected ecosystems'.
Many in the cybersecurity community have been hungry for guidance on where the industry is heading, and how all parts of the community can come together to defend against the next big cyber threat. The longing for better partnership between governmental institutions and private organizations has been around for some time, and the need for such robust partnership has only grown as cyberthreats have proliferated over the past five years. Organizati ..read more