Marc
ctimarc.bsky.social
Marc
@ctimarc.bsky.social
Reposted by Marc
Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer and #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload.

blog.sekoia.io/interlock-ra...
April 16, 2025 at 9:13 AM
Reposted by Marc
🚨To strengthen the #investigation and #detection capabilities of the Sekoia.io Threat Detection & Research (TDR) team, we are looking for a Senior Technical Threat Researcher!

www.welcometothejungle.com/fr/companies...

#CTI #DetectionEngineering
Sr Technical Threat Researcher - Sekoia.io - CDI - Télétravail total
Sekoia.io recrute un(e) Sr Technical Threat Researcher !
www.welcometothejungle.com
January 29, 2025 at 1:59 PM
Reposted by Marc
Suite PlugX: 4200 ordinateurs américains désinfectés grâce à l'entreprise Sekoia et la justice française, annonce le FBI. www.justice.gov/usao-edpa/pr...
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers
www.justice.gov
January 14, 2025 at 4:21 PM
Reposted by Marc
🎯 Ransomware-driven data #exfiltration: techniques and implications

Our new #TDR report focuses on the exfiltration techniques leveraged by #ransomware and #extortion groups.

https://buff.ly/415o0ry

#ThreatIntelligence #Detection
Ransomware-driven data exfiltration: techniques and implications
Introduction This report focuses on the exfiltration techniques leveraged by ransomware and extortion groups in lucrative campaigns. It aims to provide a comprehensive analysis of the techniques and…
buff.ly
November 27, 2024 at 10:28 AM
Reposted by Marc

New Helldown ransomware targets Windows and Linux systems, uses Zyxel firewall exploits for initial access

blog.sekoia.io/helldown-ran...
Helldown Ransomware: an overview of this emerging threat
Comprehensive Analysis of Helldown: Tactics, Techniques, and Procedures (TTPs) and Exploitation of Zyxel Vulnerabilities %
blog.sekoia.io
November 19, 2024 at 10:43 AM
Reposted by Marc
🏦 Our latest report provides insights on the cyber threats impacting the #financial sector in 2023. We analysed the trends in lucrative and state-sponsored ecosystems and outlined the most notable evolutions. For more details, check out our blog post: blog.sekoia.io/unmasking-th...
Unmasking the latest trends of the Financial Cyber Threat Landscape
This report aims at depicting recent trends in cyber threats impacting the financial sector worldwide. It focuses on principal tactics, techniques and procedures used by lucrative and state-sponsored ...
blog.sekoia.io
November 23, 2023 at 12:10 PM
Reposted by Marc
#DarkGate gained popularity among threat actors (e.g: #TA577, #DuckTail), our #RE analysis details the internals of the malware, how it implements technique to evade defenses: Union-API, token theft via UpdateProcThreadAttribute, APC injection.

blog.sekoia.io/darkgate-int...
November 20, 2023 at 1:02 PM
Reposted by Marc
🎮 We analyzed an ongoing campaign targeting online gamers. Multiple malware families are delivered through fake video game websites such as #Epsilon, #Doenerium, #BByStealer, and #NovaSentinel.

blog.sekoia.io/game-over-ga...

#CTI #infostealer
Game Over: gaming community at risk with information stealers
This report was originally published for our customers on 26 October 2023. The world of online gaming, a thriving global community of millions, has become an enticing target for malicious actors seeki...
blog.sekoia.io
November 13, 2023 at 10:02 AM