Topic: persistence techniques

  • Ransomware Hackers Weaponize Velociraptor DFIR Tool

    Ransomware Hackers Weaponize Velociraptor DFIR Tool

    Malicious actors are misusing the Velociraptor digital forensics tool to deploy LockBit and Babuk ransomware, with the Chinese threat group Storm-2603 identified as responsible. Attackers exploited a privilege escalation vulnerability in Velociraptor to maintain persistent access, using technique...

    Read More »
  • 'BRICKSTORM' Backdoor: Chinese Hackers Target US Firms

    'BRICKSTORM' Backdoor: Chinese Hackers Target US Firms

    A sophisticated cyber espionage campaign using the BRICKSTORM backdoor is targeting U.S. companies, particularly in legal, tech, and SaaS sectors, and is attributed to Chinese-aligned hackers with goals beyond intelligence gathering. The threat actors, known as UNC5221, employ a complex, multi-st...

    Read More »