The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Akira Ransomware Overview Recently, Antiy CERT (a member of the CCTGA Ransomware Prevention and Response Working Group) discovered multiple Akira ransomware attacks. ……
Based on the principles of transparency, accessibility, usability, verifiability and perceptibility of security capabilities, Antiy releases weekly updates of the AVL SDK anti-virus engine and the full set of capabilities to the public every week. 1. Weekly Update Statistical period: May 20……
The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview White Elephant is an APT organization with an Indian background. Its attack activities can be traced back to November 2009. Antiy named the organization W……
Based on the principles of transparency, accessibility, usability, verifiability and perceptibility of security capabilities, Antiy releases weekly updates of the AVL SDK anti-virus engine and the full set of capabilities to the public every week. 1. Weekly Update Statistical period: May 13……
The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview of the gang The “Swimming Snake” criminal gang has been active since the second half of 2022 and launched a large number of attacks against domes……
Based on the principles of transparency, accessibility, usability, verifiability and perceptibility of security capabilities, Antiy releases weekly updates of the AVL SDK anti-virus engine and the full set of capabilities to the public every week. 1. Weekly Update Statistical period: April ……
Based on the principles of transparency, accessibility, usability, verifiability and perceptibility of security capabilities, Antiy releases weekly updates of the AVL SDK anti-virus engine and the full set of capabilities to the public every week. 1. Weekly Update Statistical period: May 6,……
The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview of the Active yayaya Mining Trojan Recently, Antiy CERT captured a batch of active mining Trojan samples, which mainly used SSH weak password brute force to ……