Content Category: Research
Important and novel findings from our cyber threat research team.
Posting Fullz - A Novel Trend Amongst Threat Actors
Chief Research Officer Yelisey Bohuslavskiy comments on a new trend we are seeing amongst threat actors.
Weaponizing Artificial Intelligence Large Language Models (LLMs)
RedSense looks at how adversaries are working to leverage artificial intelligence large language models (LLMs) for malicious exploits.
Unraveling BlackNET - Insights from RedSense Research
While dissecting the BlackNET botnet panel, our HUNT team uncovered significant adversarial information:
BlackNET Panel & Builder: Initially developed in 2019, the BlackNET MAlware-as-a-Serivice (#MaaS) panel serves as the operational backbone for client-side components such as #stealers, #bankers, and #loaders. Central to this process is the botnet builder, which we’ve reversed to grasp its functionalities.
Our investigation revealed the following capabilities:
- Generate unique victim IDs and distinct hash sums for data logged in the panel.
- Specify the destination and filename for the malicious file.
- Launch this file at a predetermined time.
- Add the malicious file to the startup processes.
- Ensure the malicious file doesn’t execute in a virtual environment, providing a secure setting for file checks.
- Conceal the activity of this file.
- Encrypt data.
New Methods of Obfuscation in Fraud/Carding Community
A recent RedSense investigation has discovered a prevalent trend in cyberfraud groups: IP address obfuscation via a new cloaking methodology. The primary channel for dissemination of new methods such as this are Telegram chats, particularly channels that have a sizeable number of subscribers with technical knowledge.
Ransomware Groups Vie to Stay On Top
Ransomware groups are continuously refining and updating their strategies to remain at the forefront of successful cybercrime organizations. These groups regularly adapt to the changing cybersecurity landscape, implementing new or modified techniques to bypass defenses and exploit vulnerabilities.