The eSentire Blog

TRU Positive/Bulletin

9 M

Tycoon 2FA Infrastructure Update: Threat Actors Adapt Following Global Coalition Takedown

What did we find?Following the organized global coalition takedown of Tycoon 2FA phishing infrastructure led by…

READ NOW →

TRU Positive/Bulletin

16 M

EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons

What did we find?In March 2026, eSentire's Threat Response Unit (TRU) detected EtherRAT in a customer's…

READ NOW →

TRU Positive/Bulletin

9 M

MuddyWater APT + Tsundere Botnet: EtherHiding the C2

What did we find?In March 2026, eSentire's Threat Response Unit (TRU) investigated an open-directory web server…

READ NOW →

TRU Positive/Bulletin

24 M

North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')

What did we find?In February 2026, eSentire's Threat Response Unit (TRU) detected DEV#POPPER, a sophisticated…

READ NOW →

Threat Response Unit

3 M

Microsoft Announces Disruption of Tycoon 2FA in Coordination with Industry Partners

March 4, 2026 – Today, Microsoft announced they took action to disrupt and coordinate seizure of infrastructure…

READ NOW →

Threat Response Unit

6 M

How Cybercriminals Customized Attacks for Five Industries in 2025

In 2025, identity-related cybercrime scaled rapidly with the expansion of "as-a-Service" models. Offering…

READ NOW →

TRU Positive/Bulletin

22 M

Tenant from Hell: Prometei's Unauthorized Stay in Your Windows Server

What did we find? In January 2026, eSentire's Threat Response Unit (TRU) detected a malicious command attempting…

READ NOW →

Threat Response Unit

30 M

Weaponized in China, Deployed in India: The SyncFuture Espionage Targeted Campaign

What did we find? In early December 2025, the eSentire Threat Response Unit (TRU) identified an ongoing…

READ NOW →

Threat Response Unit

10 M

The Industrialization of Cybercrime: 7 Key Statistics from eSentire's 2026 Annual Cyber Threat Report

Cyber threats are undergoing a fundamental shift in how they operate. Account compromise and identity-based…

READ NOW →

Threat Response Unit

5 M

Curiosity: A Cat’s Worst Enemy, But A SOC Analyst's Best Friend

The toolkit of a Security Operations Center (SOC) Analyst should include a wide variety of tools and resources;…

READ NOW →

TRU Positive/Bulletin

19 M

EVALUSION Campaign Delivers Amatera Stealer and NetSupport RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

10 M

Unpacking NetSupport RAT Loaders Delivered via ClickFix

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →
Page
of 18