Blog Posts

IcedID Analysis

IcedID aka (BokBot) is banking malware designed to steal financial information. Lunar Spider is the threat actor behind IcedID which they’ve been running campaigns since at least 2017. Beside stealing banking information, some incident show that IcedID is an entry stage to ransomware or RAT attack. It’s been observed lately that the threat actor has … Continue reading IcedID Analysis

SolarWinds Attack Plan A: The Imposter

The on-going investigation of SUNBURST/Solorigate supply-chain attack led by FireEye and Microsoft threat teams have reached to the second stage of the attack SUNSHUTTLE [3] [4]. More backdoors and C2 servers been discovered each time disclosing a stage of this wide and massive attack. Estimating the attacker distributed the SUNBURST during March 2020 [5] from … Continue reading SolarWinds Attack Plan A: The Imposter

Dridex Malware Analysis [10 Feb 2021]

Dridex “also know as Bugat and Cridex” is a form of malware banking trojan and infostealer that operated by criminal group referred to as “Indrik Spider”. Dridex specializes in stealing banking credentials via systems that utilizes macros from Microsoft office products like Word and Excel. In previous recoded incident the threat actors have used Dridex … Continue reading Dridex Malware Analysis [10 Feb 2021]

Dridex Malware Analysis [8 Feb 2021]

Dridex “also know as Bugat and Cridex” is a form of malware banking trojan and infostealer that operated by criminal group referred to as “Indrik Spider”. Dridex specializes in stealing banking credentials via systems that utilizes macros from Microsoft office products like Word and Excel. In previous recoded incident the threat actors have used Dridex … Continue reading Dridex Malware Analysis [8 Feb 2021]

Loading…

Something went wrong. Please refresh the page and/or try again.

About Me

Cybersecurity and reverse engineer malware analyst professional with 10 years of progressive experience. operating within public and private domains. Specialized in delivering cybersecurity and system competitive solutions and developing training paths. Experienced with security operation, threat analysis, and incident response at scale. Adept at project management of new agile solutions, and learning new hard skills

featured blog post tweets