Research Reports
-
ResearchCyber Risk Intelligence: LockBit 3.0 Ransomware Group Claims Defense Contractor Breach
January 12, 2023More DetailsDr. Robert Ames, Staff Threat Researcher
Attack Surface Management, Cyber Insurance, Cyber Threat Intelligence, Supply Chain Cyber Risk -
ResearchHow to Analyze JavaScript Malware – A Case Study of Vjw0rm
January 10, 2023Vjw0rm is a worm that spreads via USB drives and has RAT capabilities because it implements different commands transmitted by the C2 server. It establishes persistence on a machine by copying to the Startup folder and creating a Run registry entry. The malware drops a Java-based RAT called STRRAT, executed using the Java executable that can be found on the local computer or downloaded from a remote URL.
More DetailsVlad Pasca
-
ResearchIran-Attributed Exploitation of Log4Shell Vulnerability
January 6, 2023More DetailsDr. Robert Ames, Staff Threat Researcher
Cyber Threat Intelligence, STRIKE Team -
ResearchA Technical Analysis Of The Royal Ransomware
November 14, 2022This malware encrypts files with the AES algorithm, either fully or partially. The extension of the affected files changes to “.royal”. Find out more in this technical analysis of the Royal Ransomware from SecurityScorecard’s Senior Malware Analyst, Vlad Pasca.
More DetailsVlad Pasca
-
ResearchKillNet Operations Against U.S. Targets Persist With Attempted Airport Website Attacks
November 7, 2022More DetailsDr. Robert Ames, Staff Threat Researcher
Public Sector -
ResearchSecurityScorecard Investigation and Response to New and Widespread OpenSSL 3.X Vulnerability
November 1, 2022More DetailsRob Ames, PhD, Staff Threat Researcher; Ryan Sherstobitoff, SVP of Threat Intelligence; Tien Phan, Staff Threat Researcher; Jared M. Smith, PhD, Senior Director of Threat Research; Ondřej Janda, Staff Software Engineer
-
ResearchA Detailed Analysis Of The Gafgyt Malware Targeting IoT Devices
October 18, 2022More Details -
Research, White PaperA Detailed Analysis Of The Quantum Ransomware
September 14, 2022More DetailsAttack Surface Management, Cyber Insurance, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk



