Analysis and Review of the Ransomware Attack on Boeing——Analysis of the Threat Trend of Targeted Ransomware and Thoughts on Defense

1.Foreword Around 2016, the mainstream threat form of blackmail attacks has gradually shifted from the spread of extortion gangs or the widespread release of ransomware to the operation mode of RaaS + targeted attacks to collect high ransom. Raas, short for Ransomware as a Service, is a ransom……

Continue Reading

Comprehensive Analysis of ArmouryLoader – Series Analysis of Typical Loader Families (Five)

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese Introduction With the development of network attack technology, the malware loader is becoming the key component of malware execution. Such loaders are a malicious to……

Continue Reading

Be Vigilant of Data Leaks Caused by the BlackCat Ransomware

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT (member of the CCTGA Ransomware Prevention and Response Working Group) has found a number of BlackCat [1] ransomware attacks. Blackcat r……

Continue Reading

A Comprehensive Analysis of the HijackLoader ——Analysis of the Typical Loader Family Series IV

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese Introduction to the Loader Series Analysis Report With the development of network attack technology, the malicious code loader is becoming the key component of malici……

Continue Reading

Continued Phishing Attempts Against Endpoint Targets——Recent Sample Analysis of the “BITTER” Attack Group

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Since 2012, Antiy Security Research and Emergency Response Center (Antiy CERT) has been continuously paying attention to and analyzing cyber attack act……

Continue Reading

The “SwimSnake” Cybercriminal Group Distributes Remote Control Trojans by Leveraging Counterfeit WPS Office Download Sites

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Antiy CERT discovered that the “SwimSnake” cybercriminal group used a counterfeit WPS Office download site to spread remote control Trojans. If……

Continue Reading

A Comprehensive Analysis of the SmokeLoader——Analysis of the Typical Loader Family Series III

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese Introduction to the Loader Series Analysis Report With the development of network attack technology, the malicious code loader is becoming the key component of malici……

Continue Reading

“SwimSnake” Cybercriminal Operations Rampant! Launch Special Inspection and Handling Immediately!

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview The “SwimSnake” cybercriminal group (also known as “Silver Fox”, “Valley Thief”, “UTG-Q-1000”, etc.) has be……

Continue Reading

Hidden Threats: Analysis of Active “Poisoning” Incidents Disguised as Open-source Projects

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview In recent years, the use of open source ecological trust in GitHub disguised open source projects for malicious code “poisoning” attacks contin……

Continue Reading

A Comprehensive Analysis of the DBatLoader Malicious Loader ——Analysis of Typical Loader Families II

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Introduction As cyberattack techniques continue to evolve, malicious code loaders have gradually become a key component of malicious code execution. Such loaders are ……

Continue Reading

Analysis of a Group of Phishing Attacks by Taiwan’s “Green Spot” Attack Organization Using Open-source Remote Control Trojan

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview In the second half of 2024, Antiy Emergency Response Center tracked APT attacks by Green Spots against specific industry targets in our country. The at……

Continue Reading

8 High-risk Instructions! Counterfeit DeepSeek Can Actually Remotely Enable VNC Monitoring, and Your Phone May Become a Zombie

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese Recently, DeepSeek, a large domestic AI model, has gained widespread attention worldwide thanks to its outstanding performance, and at the same time has become a target ……

Continue Reading

A Review of Active Ransomware Attack Organizations in 2024

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Extortion attacks have now become one of the major cyber security threats to organizations around the world, and have been used by attackers as a criminal ……

Continue Reading

Analysis of Three Variants of the HailBot Botnet Attacking DeepSeek

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Antiy CERT released the report “Analysis of Botnet Samples Related to Attacks on DeepSeek”, analyzing the two active botnet systems RapperBot a……

Continue Reading

A Review of Active Mining Trojans in 2024

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview The mining Trojanuses various means to implant the mining program into the victim’s computer, and without the user’s knowledge, uses the comput……

Continue Reading

Analysis of Botnet Samples Related to Attacks on Deepseek

1.Overview Recently, the online service of DeepSeek, a domestic AI model, was attacked by a large-scale cyber attack, resulting in multiple service interruptions. This has attracted the attention of the domestic security industry. According to the monitoring report of Qianxin XLab, it was foun……

Continue Reading

Special Series Analysis on Popular Malicious Loader Families – Part One | XLoader

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Introduction As cyberattack techniques continue to evolve, malicious code loaders have gradually become a key component of malicious code execution. Such loaders ar……

Continue Reading

Recent Activity Analysis of the Outlaw Mining Botnet

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT has detected a number of cyber attacks on Outlaw mining zombies, which were first discovered in 2018 and mainly engaged in mining acti……

Continue Reading

Phishing Download Websites Spread the “Swimming Snake” Threat, with Malicious Installers Hiding Remote Control Trojans

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Since being active in the second half of 2022, the “Swimming Snake” Black Producer Group (also known as “Silver Fox,” “Valley R……

Continue Reading

Analysis of the InterLock Ransomware Attacking Group’s Situation

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview The InterLock ransomware attack group was discovered in September 2024. This group penetrates victims’ networks through various means such as phish……

Continue Reading

Analysis of the Mining Trojan “app Miner” Activity

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT detected a mining Trojan attack incident. This mining Trojan first appeared in March 2024 and has continuously updated its attack script……

Continue Reading

Safeguarding China Operation (Part 5)——APT Capture, Analysis and Traceability

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, a……

Continue Reading

Safeguarding China Operation (Part 4)——Mobile Security Threat Analysis, Response, and Disposal

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, a……

Continue Reading

Safeguarding China Operation (Part 3)——Analysis and Judgment of Major Events and Response to High-Risk Vulnerabilities

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, a……

Continue Reading

Safeguarding China Operation (Part 2)——Analysis, Response and Disposal of Black Market Activities Such as Ransomware

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, a……

Continue Reading

Safeguarding China Operation (Part 1)——Analysis and Response to Major Worm and Botnet Events

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, a……

Continue Reading

Innovative Breakthrough – Dedicated to China

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese At 10: 00 a.m. on October 1, 2024, the first CPU architecture version of the VILLM was transplanted successfully and the internal test was completed. The model used activa……

Continue Reading

Analysis and Research on the Bombing Incident of BPMs in Lebanon

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese Note: On the 17th, a large number of pagers exploded in Lebanon, and Antiy organized an analysis team to follow up, analyze and report the incident on the Internet, and……

Continue Reading

Analysis of the Active RansomHub Ransomware Attacking Group Situation

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview The RansomHub ransomware attacking group was found in February 2024 and has continued to be active since its emergence, operating on a ransomware-as-a-servic……

Continue Reading

Analysis of the Activity of “Black Myth Wukong Modifier” Spreading Malware

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese This report is a machine-translated version. 1.Overview Recently, Antiy CERT has discovered the spread of malware by using the “Black Myth Wukong Modifier̶……

Continue Reading

Risk Warning and Temporary Mitigation Tool for Windows Server RDL Remote Execution Vulnerability

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1. Vulnerability overview Microsoft in July fixed three Windows Server Remote Desktop Licensing Service (RDL) remote code execution vulnerabilities, identified as CVE-2……

Continue Reading

Analysis Notes on CrowdStrike’s Library Loading and Rapid Upgrade Mechanism

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese In response to a large Window host blue screen event caused by CrowdStrike, Antiy Cloud Security Center, Antiy CERT and Antiy Attack and Defense Laboratory released a long……

Continue Reading

The Emergency Response Input Method High-risk Vulnerability of Antiy IEP EDR

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Vulnerability overview On August 1, 2024, a third-party input method was found to have a vulnerability that bypasses the login authority of windows 10 and windows 11 ……

Continue Reading

Ransomware Attack Organizations Review In the First Half of 2024

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Ransomware is a highly destructive computer malware. In recent years, it has become one of the major cybersecurity threats to organizations around the world,……

Continue Reading

Analysis of Attack Activities Disguised as CrowdStrike Repair Files

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Windows operating system hosts using CrowdStrike ‘s terminal security products encountered a serious system crash, namely the “Blue Scr……

Continue Reading

A Technical Analysis of the CrowdStrike Global System Failure——Contemplating “Falcon’s Broken Wings”

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Basic Situation and Impact of the Incident Starting at noon on July 19, 2024, Beijing time, users in many parts of the world reported on social platforms such as X……

Continue Reading

Nacos Remote Code Execution Vulnerability Risk Advisory

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Vulnerability Overview Nacos is a dynamic service discovery, configuration management and service management platform that makes it easier to build cloud-native appli……

Continue Reading

FAQ About OpenSSH

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.What Is OpenSSH? Is It Widely Distributed? SSH (Secure Shell) is a secure network protocol used to securely transmit data between two untrusted hosts over an inse……

Continue Reading

OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387) Risk Alert

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Vulnerability Description OpenSSH is a set of secure network utilities based on the Secure Shell (SSH) protocol, which provides encryption to protect privacy and secu……

Continue Reading

Analysis of Phishing Attack Activities Carried out by the SwimSnake Black Industry Gang Using Malicious Documents

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview The “SwimSnake” black production gang has been active since the second half of 2022, launching a large number of fishing attacks and fraud acti……

Continue Reading

Analysis of the”Nichan”Mining Trojan Activity

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT discovered a new mining Trojan attack through network security monitoring. The mining Trojan began to appear in November 2023, and its……

Continue Reading

Analysis of the Recent Attack Activities of the “SwimSnake” Black Industry

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview The black products of “SwimSnake” have been active since the second half of 2022, and have launched a large number of fishing attacks and fraud……

Continue Reading

Fight Against the Bald Eagle in the Fog -RELAYING, COOPERATING AND SPECIFIC CONTRIBUTION

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview On February 12, 2024, SentinelOne, an American cybersecurity company, released a report entitled “China’s Cyber Revenge/Why the PRC Fails t……

Continue Reading

Analysis of Attack Activities Spreading Data-Stealing Trojan via Github

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT has detected an attack campaign that spreads data-stealing Trojans through GitHub. The attackers added malicious URLs to the requireme……

Continue Reading

Antiy Annual Security Report 2023

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Introduction At the beginning of each year, it is the tradition of Antiy Security Research and Emergency Response Center (Antiy CERT) for many years to analyze and ……

Continue Reading

2023 Active Mining Trojan Review

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Mining Trojans use various means to implant mining programs into victims’ computers, and use the computing power of victims’ computers to mine ……

Continue Reading

2023 Active Ransomware Attack Organizations Review

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Ransomware is a highly destructive computer Trojan program. In recent years, it has become one of the major cybersecurity threats to organizations arou……

Continue Reading

Analysis of the Mac Remote Control Trojan Attack Activities Spread by the “Dark Mosquito” Black Industry Gang through Domestic Download Sites

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT discovered a group of cases of poisoning and attacking downstream users by using unofficial software download stations, and analyzed i……

Continue Reading

Analysis of phishing attacks by “X Elephant” group against scientific research institutions in china

1.Overview Recently, Antiy CERT (Security Research and Emergency Response Center) discovered during daily email monitoring that overseas APT attack organizations imitated the official organization of our “慧眼行动” and sent phishing emails to relevant scientific research institutions ……

Continue Reading

Analysis of Mirai Botnet Variant “Aquabot”

The original report is in Chinese, and this version is an AI-translated edition. Download PDF View in Chinese 1.Overview Recently, Antiy CERT has captured a new variant of the Mirai botnet, targeting MIPS, ARM, X86 and other architectures, infected targets with weak passwords a……

Continue Reading