Key findings How a pivot on the Whois of the C2 domains of Matanbuchus can be leveraged to anticipate future campaigns and wider threats. A seemingly Russia-based Bulletproof hosting service is currently used by impactful intrusion sets leveraging Matanbuchus and...
ThreeAM ransomware Key findings In this report are presented: Intrinsec’s CTI analysts unveil a new extortion scheme being tested by ThreeAM via X (previously known as Twitter). Bots could have been used to automatically name and shame amongst followers of its...
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of September 2023. This cybercrime threat landscape analysis will particularily highlight : Increase of ransomware attacks between August &...
LummaC2 Stealer Key findings In this report are presented: Lumma Stealer, also known as LummaC2 Stealer, is a malware-as-a-service sold through Telegram and Russian-speaking cybercrime forums. In this report, the following will be addressed: The presence of Lumma in...
Cyber Threats targetting the energy industry GuLoader Information report Key findings In this report are presented: The origin of the malware and information about the company running it. How multiple companies from the energy sector including, three French companies...
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of August 2023. This cybercrime threat landscape analysis will particularily highlight : Decrease of ransomware attacks between July &...