The eSentire Blog

TRU Positive/Bulletin

4 M

Fake Chrome Setup Leads to NetSupportManager RAT and Mars Stealer

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

Expect Aftershocks from the Ongoing Russian-Allied Cyber Threats

In January, the Cybersecurity and Infrastructure Security Agency (CISA) released an Alert (AA22-011A) outlining…

READ NOW →

TRU Positive/Bulletin

4 M

UpdateAgent macOS Malware

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

9 M

eSentire Threat Intelligence Malware Analysis: HeaderTip

Since humans are still the weakest link in cybersecurity, threat actor(s) continue to prey on fallible human…

READ NOW →

Threat Response Unit

7 M

eSentire Threat Intelligence Malware Analysis: DoubleZero

DoubleZero is a newly emerging destructive malware targeting Ukrainian enterprises. The initial access vector is…

READ NOW →

Threat Response Unit

6 M

eSentire Threat Intelligence Malware Analysis: CaddyWiper

First discovered by ESET researchers in March 2022, CaddyWiper malware is a new type of wiper malware used by…

READ NOW →

TRU Positive/Bulletin

4 M

Suspected AsyncRAT Delivered via ISO Files Using HTML Smuggling Technique

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

14 M

eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket

Recently, there have been multiple reports of new wiper malware observed targeting Ukrainian organizations as part…

READ NOW →

Threat Response Unit

14 M

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

A Cobalt Strike Cybercrime Syndicate and the Ransomware Hackers’ Favorite Weapon On March 9, the Cybersecurity…

READ NOW →

Threat Response Unit

12 M

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

As defenders, often our only insight into an adversary’s tradecraft is gleaned through an analysis of…

READ NOW →

TRU Positive/Bulletin

3 M

Exploitation of VMware Horizon Servers by TunnelVision Threat Actor

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

IcedID to Cobalt Strike In Under 20 Minutes

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 16