February 13, 2025
Advancements in delivery: Scripting with Nietzsche
We’ve recently come across a complex delivery chain utilizing multiple script languages designed to deploy high-profile malware families such as the open-source-made DCRat or the Rhadamanthys infostealer.
January 09, 2025
SharpRhino: An old, new threat
SharpRhino is delivered as legitimate software and grants remote access to the victim's machine. Read our full analysis to see how attackers use it to propagate other malware.
January 08, 2025
TMPN (Skuld) Stealer: The dark side of open source
Skuld, also known as TMPN Stealer, is an information-stealing malware written in Golang (Go) that emerged in May 2023. Read the full analysis of this open-source threat.
September 10, 2024
Operation WordDrone – Drone manufacturers are being targeted in Taiwan
Threat actors are using Winword, an ancient version of Microsoft Office, to target drone manufacturers in Taiwan. Read the full analysis from the TRU Security team.
August 19, 2024
Microsoft Exchange misconfiguration opens the door to spoofing attacks
Users who have not properly configured Microsoft Exchange are exposed to email spoofing, which could lead to email compromise, data breaches and more.
August 08, 2024
Acronis Infrastructure Security Scanner
In today’s rapidly evolving digital landscape, regularly scanning a company’s external perimeter for vulnerabilities іs not only a proactive measure, but also an essential defense strategy.
August 05, 2024
Zola ransomware: The many faces of the Proton family
Zola ransomware is the latest addition to the Proton ransomware family. Acronis researchers break down the evolution of a Zola attack, from execution to encryption.
July 10, 2024
Eldorado ransomware: The new player targeting U.S. companies
Eldorado ransomware has been active from at least March 2024. It mostly targets U.S. companies, including health care, education and government sectors.
July 01, 2024
Hunters International: New ransomware based on Hive source code
Hunters International ransomware was first spotted in October 2023. While it shares many similarities with Hive ransomware, it is not a rebrand. But like Hive, Hunters International works as ransomware as a service (RaaS) and besides encryption, it also exfiltrates victim data.
May 07, 2024
Using LNK files in cyberattacks
In our daily work, we are constantly facing various attacks that can be directed at different organizations. One of these cases was the reason for an in-depth study of LNK files.
April 01, 2024
Frea ransomware: A new sibling in the Chaos family
Detected at the end of 2024, Frea ransomware is a new variant in the Chaos ransomware family. Our latest malware analysis explores Frea in depth, with technical details on the execution and the encryption and post-encryption process.
March 06, 2024
Tech stack consolidation: 3 things your MSP should know and 3 things to avoid
From cybersecurity and backup to ticketing and billing, MSPs find themselves cobbling together tools and juggling multiple siloed consoles.