Sep 26, 2022 12:31 AM

    Brave Prince Threat Report: What Is Brave Prince and How Does It Work?

    The Brave Prince is a Remote Access Trojan(RAT) that was first observed in the wild in December 2017. It contains…
    Sep 25, 2022 4:12 AM

    Bisonal Malware Report: What Is Bisonal and How Does It Work?

    Bisonal is a remote access tool that the Tonto Team has used to attack public and private sector organizations in…
    Sep 24, 2022 10:51 PM

    Threat Report Xbash: What is Xbash and How Does it Work?

    Xbash is a malware family that has targeted Linux and Microsoft Windows servers. The malware has been tied to the…
    Sep 23, 2022 12:27 AM

    H1N1 Malware Report: What is H1N1 and How Does it Work?

    H1N1 is a malware variant that has evolved to include information-stealing functionality. It affects the following operating systems: ['Windows']. H1N1…
    Sep 22, 2022 9:27 PM

    Doki Malware Report: What is Doki and How Does it Work?

    The Doki backdoor uses a unique domain generation algorithm based on the Dogecoin blockchain to generate its C2 domains. It…
    Sep 21, 2022 9:27 PM

    HOPLIGHT Malware Report: What is HOPLIGHT and How Does it Work?

    HOPLIGHT is a backdoor Trojan that has reportedly been used by the North Korean government to collect machine information, exfiltrate…
    Sep 20, 2022 1:03 AM

    Slouthfulmedia: What is Slouthfulmedia and How Does it Work?

    Slouthfulmedia is a remote access Trojan written in C++ that has been used by an unidentified "sophisticated cyber actor" since…
    Sep 19, 2022 12:23 AM

    Chopstick Malware Threat Report: What is Chopstick and How Does it Work?

    The Chopstick malware family is a modular backdoor used by APT28. It has been used since at least 2012, and…
    Sep 18, 2022 11:30 PM

    Malware Threat Report: What is GravityRAT and How Does it Work?

    GravityRAT malware infects systems and steals files, often targeting corporate and government entities in India. The malware uses a variety…
    Sep 17, 2022 12:12 AM

    Helminth Malware Report: What Is Helminth and How Does It Work?

    Helminth is a backdoor that can come in the form of a VBScript or PowerShell script delivered via a macro…
    Sep 16, 2022 3:12 PM

    GrimAgent Malware Report: What Is GrimAgent and How Does It Work?

    GrimAgent is a backdoor that has been used to deploy Ryuk ransomware. It is likely used by FIN6 and Wizard…
    Sep 15, 2022 2:44 PM

    JSS Loader Threat Report: What is JSS Loader Malware and How Does it Work?

    The JSS Loader is a remote access Trojan that was first detected in 2020 by [FIN7]. It affects the Windows…

    Headline

    The world’s top news story. Breaking news that you just can’t miss. Reactionary Times covers stories and important goings on from every corner of the earth. Whether American or International, these stories are of extreme importance.

    Back to top button