Molerats
The Cybereason Nocturnus Team has identified an active espionage campaign attributed to the threat actor known as Molerats that employs three previously unidentified malware variants.
Read MoreFind more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.
Featured
See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
Watch NowThe Cybereason Nocturnus Team has identified an active espionage campaign attributed to the threat actor known as Molerats that employs three previously unidentified malware variants.
Read MoreThe Cybereason Nocturnus Team has been tracking threat actors leveraging the previously undetected Chaes malware to primarily target Brazilian customers of the largest e-commerce company in Latin America, MercadoLivre.
Read MoreKimsuky has been observed targeting a wide array of victims including public and private sector companies in the U.S., Europe, Japan, South Korea, & Russia.
Read MoreIn 2018, the Cybereason Research team identified a series of attacks targeting telecommunications companies. Quiz the experts in this interactive webinar.
Read MoreIn 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers.
Read MoreRansomware is not a new form of attack, but GandCrab has upgraded it to be more dynamic and harder to resolve.
Read MoreIn this research, we explain one of the most recent and unique campaigns involving the Astaroth trojan. This Trojan and information stealer was recognized in Europe and chiefly affected Brazil through the abuse of native OS processes and the exploitation of security-related products.
Read MoreCybereason detected an evasive infection technique used to spread a variant of the Ramnit banking Trojan as part of an Italian spam campaign. We investigate this attack, its use of sLoad, and its adoption of LOLbins to minimize discovery.
Read MoreCybereason’s Nocturnus team mapped out the multi-stage malware distribution infrastructure behind Brazilian financial malware and found that Brazilian-made malware have become pervasive and target over 60 banks in nearly a dozen countries throughout Latin America, Spain and Portugal.
Read MoreCybereason's Nocturnus Research team analyzes campaigns targeting the Brazilian financial sector, focusing on infection vectors and the threat actor's toolset and techniques.
Read More