A Detailed Analysis of the LockBit RansomwareLockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption... KNOWLEDGE CENTER Case Study cybersecurity Grief Ransomware Whitepaper A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an... .CONTI cybersecurity ransomware Whitepaper A Detailed Analysis of The Last Version of Conti Ransomware October 25, 2021 Conti ransomware has been sold as a RaaS (Ransomware as a Service) in underground forums and it’s usually deployed by other... cyber security FALLCHILL LAZARUS malware RAT Whitepaper A Detailed Analysis of Lazarus’ RAT Called FALLCHILL September 20, 2021 FALLCHILL is a RAT that has been used by Lazarus Group since 2016. The malware decrypts multiple strings at runtime using... cybersecurity RAT Vjw0rm Worm Whitepaper Vjw0rm Worm/RAT September 17, 2021 Vjw0rm is a worm that usually spreads via USB drives. It’s also classified as a RAT because it executes commands received... AES256 algorithm Makop ransomware malware Whitepaper Makop Ransomware August 27, 2021 Makop ransomware encrypts user’s files using the AES256 algorithm and advises the victims to contact the attackers via Tox (P2P instant-messaging... Credential Dumping malware Whitepaper Windows 10 Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts... Django Templates post-exploitation Python server-side template injection SSTI Whitepaper Django Templates Server-Side Template Injection v1.0 June 16, 2021 Long gone are days of static websites, nowadays sites need to be dynamic to be attractive and useful. One of... cybersecurity phishing Phishing Infrastructure Whitepaper PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... attack vectors cybersecurity exploit penetration test vulnerability Whitepaper Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?... Handling Cybersecurity Incidents according to NIST SP-61 Incident Response Process Whitepaper Incident Response Process November 3, 2020 Handling Cybersecurity Incidents according to NIST SP-61 According to ISO/IEC 27035:2011 on Information security incident management, an information security incident... Cybersecurity exercises International Standard ISO 22398 Whitepaper Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not... Forensic Analysis of Windows Shellbags Investigative Value of Windows ShellBags LIFARS Tech Diary Whitepaper Windows ShellBags Forensics Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary... Effective Measures to Prevent Phishing Attacks Fortification of Your Human Cyber Defenses Phishing Attack Simulations Phishing is a social engineering technique Whitepaper Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective... Data Breach Litigation Expert Digital Forensics and Incident Response Unit evil corp LIFARS Data Breach Response Malware Analysis Ransomware Containment and Remediation Ransomware Response Guideline Whitepaper Ransomware Response Guideline, Digital Forensics and Incident Response Unit September 5, 2019 Like the name implies, ransomware is essentially digital extortion that is executed through software that uses encryption techniques to keep... Complimentary Consulting on Ransomware Attacks Cyberextortion and Ransomware evil corp Ransomware Advisory Whitepaper Ransomware Advisory-Complimentary Consulting on Ransomware Attacks September 5, 2019 LIFARS provides complimentary consulting on Ransomware attacks to determine if a move forward decision is desired with factors consisting of...
A Detailed Analysis of the LockBit RansomwareLockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...
KNOWLEDGE CENTER Case Study cybersecurity Grief Ransomware Whitepaper A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an... .CONTI cybersecurity ransomware Whitepaper A Detailed Analysis of The Last Version of Conti Ransomware October 25, 2021 Conti ransomware has been sold as a RaaS (Ransomware as a Service) in underground forums and it’s usually deployed by other... cyber security FALLCHILL LAZARUS malware RAT Whitepaper A Detailed Analysis of Lazarus’ RAT Called FALLCHILL September 20, 2021 FALLCHILL is a RAT that has been used by Lazarus Group since 2016. The malware decrypts multiple strings at runtime using... cybersecurity RAT Vjw0rm Worm Whitepaper Vjw0rm Worm/RAT September 17, 2021 Vjw0rm is a worm that usually spreads via USB drives. It’s also classified as a RAT because it executes commands received... AES256 algorithm Makop ransomware malware Whitepaper Makop Ransomware August 27, 2021 Makop ransomware encrypts user’s files using the AES256 algorithm and advises the victims to contact the attackers via Tox (P2P instant-messaging... Credential Dumping malware Whitepaper Windows 10 Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts... Django Templates post-exploitation Python server-side template injection SSTI Whitepaper Django Templates Server-Side Template Injection v1.0 June 16, 2021 Long gone are days of static websites, nowadays sites need to be dynamic to be attractive and useful. One of... cybersecurity phishing Phishing Infrastructure Whitepaper PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... attack vectors cybersecurity exploit penetration test vulnerability Whitepaper Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?... Handling Cybersecurity Incidents according to NIST SP-61 Incident Response Process Whitepaper Incident Response Process November 3, 2020 Handling Cybersecurity Incidents according to NIST SP-61 According to ISO/IEC 27035:2011 on Information security incident management, an information security incident... Cybersecurity exercises International Standard ISO 22398 Whitepaper Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not... Forensic Analysis of Windows Shellbags Investigative Value of Windows ShellBags LIFARS Tech Diary Whitepaper Windows ShellBags Forensics Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary... Effective Measures to Prevent Phishing Attacks Fortification of Your Human Cyber Defenses Phishing Attack Simulations Phishing is a social engineering technique Whitepaper Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective... Data Breach Litigation Expert Digital Forensics and Incident Response Unit evil corp LIFARS Data Breach Response Malware Analysis Ransomware Containment and Remediation Ransomware Response Guideline Whitepaper Ransomware Response Guideline, Digital Forensics and Incident Response Unit September 5, 2019 Like the name implies, ransomware is essentially digital extortion that is executed through software that uses encryption techniques to keep... Complimentary Consulting on Ransomware Attacks Cyberextortion and Ransomware evil corp Ransomware Advisory Whitepaper Ransomware Advisory-Complimentary Consulting on Ransomware Attacks September 5, 2019 LIFARS provides complimentary consulting on Ransomware attacks to determine if a move forward decision is desired with factors consisting of...
Case Study cybersecurity Grief Ransomware Whitepaper A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an...
.CONTI cybersecurity ransomware Whitepaper A Detailed Analysis of The Last Version of Conti Ransomware October 25, 2021 Conti ransomware has been sold as a RaaS (Ransomware as a Service) in underground forums and it’s usually deployed by other...
cyber security FALLCHILL LAZARUS malware RAT Whitepaper A Detailed Analysis of Lazarus’ RAT Called FALLCHILL September 20, 2021 FALLCHILL is a RAT that has been used by Lazarus Group since 2016. The malware decrypts multiple strings at runtime using...
cybersecurity RAT Vjw0rm Worm Whitepaper Vjw0rm Worm/RAT September 17, 2021 Vjw0rm is a worm that usually spreads via USB drives. It’s also classified as a RAT because it executes commands received...
AES256 algorithm Makop ransomware malware Whitepaper Makop Ransomware August 27, 2021 Makop ransomware encrypts user’s files using the AES256 algorithm and advises the victims to contact the attackers via Tox (P2P instant-messaging...
Credential Dumping malware Whitepaper Windows 10 Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts...
Django Templates post-exploitation Python server-side template injection SSTI Whitepaper Django Templates Server-Side Template Injection v1.0 June 16, 2021 Long gone are days of static websites, nowadays sites need to be dynamic to be attractive and useful. One of...
cybersecurity phishing Phishing Infrastructure Whitepaper PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and...
attack vectors cybersecurity exploit penetration test vulnerability Whitepaper Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?...
Handling Cybersecurity Incidents according to NIST SP-61 Incident Response Process Whitepaper Incident Response Process November 3, 2020 Handling Cybersecurity Incidents according to NIST SP-61 According to ISO/IEC 27035:2011 on Information security incident management, an information security incident...
Cybersecurity exercises International Standard ISO 22398 Whitepaper Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not...
Forensic Analysis of Windows Shellbags Investigative Value of Windows ShellBags LIFARS Tech Diary Whitepaper Windows ShellBags Forensics Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary...
Effective Measures to Prevent Phishing Attacks Fortification of Your Human Cyber Defenses Phishing Attack Simulations Phishing is a social engineering technique Whitepaper Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective...
Data Breach Litigation Expert Digital Forensics and Incident Response Unit evil corp LIFARS Data Breach Response Malware Analysis Ransomware Containment and Remediation Ransomware Response Guideline Whitepaper Ransomware Response Guideline, Digital Forensics and Incident Response Unit September 5, 2019 Like the name implies, ransomware is essentially digital extortion that is executed through software that uses encryption techniques to keep...
Complimentary Consulting on Ransomware Attacks Cyberextortion and Ransomware evil corp Ransomware Advisory Whitepaper Ransomware Advisory-Complimentary Consulting on Ransomware Attacks September 5, 2019 LIFARS provides complimentary consulting on Ransomware attacks to determine if a move forward decision is desired with factors consisting of...