

While searching through our data for any samples of our current pandemic and threat actors’ favorite theme, I came across a rather interesting sample. The email and DOC are rather simple but consistent in theme and lacking the usual spelling and grammatical errors.
We tend to go a bit overkill on everything. Building a desktop? Yeah, 64GB of RAM should suffice, you know, just in case Windows 11 comes out next week. Testing a new service in Amazon EC2? Well t3.xlarge has more than enough just enough in case of technical things I …
We were looking through some of our latest data and came across an interesting phish. It wasn’t extremely well crafted as can be seen in the image below.
You might ask yourself why this is even worth looking at. Well it turned out that there was a very interesting URL …
Recently I decided to go spelunking through our data in search of any rarities that we have collected. And today I will share some of these interesting specimens. None of these samples are truly unique and most of them are already well known and well documented, but this exercise can …
Yes… another Emotet post, but they just keep on changing things up! We were having a look around our data from the Emotet botnet and came across an interesting example of the reply-chain tactic that has become the new normal for them.
As can be seen in the example above, …
If you’ve been following any infosec community news recenty, you may have seen that the SHA1 hash has taken yet another blow. Shoutout to Dan Goodin at Ars Technica for an easy-to-follow explanation of what just happened here. This isn’t the first time SHA1 has had a bad day …
An email caught my eye this morning. Not because of a unique social engineering theme or a new delivery technique, but because of the sheer number of attachments, a shotgun approach to malware delivery. There were 3 RTF files with spoofed .doc and docx.doc extensions, an ARJ archive containing an …