PinnedA beginner(s) guide to hunting web-based credit card skimmersHello everyone, and welcome back to another blog post. Today, I will show you my approaches to hunting credit card skimmers.Jan 23A response icon1Jan 23A response icon1
PinnedThe curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…Oct 19, 2023A response icon2Oct 19, 2023A response icon2
VexTrio’s Browser FingerprintingHey everyone, welcome back to the first blog post in 2024. Today, we are going to have a look at something I came across while looking at…Mar 19, 2024Mar 19, 2024
Gi7w0rm’s personal year review — 2023Disclaimer: The following article will highlight my work and achievements in 2023. I am not sure if this is going to be worth reading, but…Jan 6, 2024A response icon1Jan 6, 2024A response icon1
Uncovering DDGroup — A long-time threat actorSometimes when investigating malware, you come across something that calls your attention. Something that seems odd, something that seems…Sep 8, 2023Sep 8, 2023
CloudEyE — From .lnk to ShellcodeHello and welcome back to another blog post. Today, we will look at the infection chain of a well-known malware loader called CloudEye…Jul 9, 2023A response icon1Jul 9, 2023A response icon1
DynamicRAT — A full-fledged Java RatHello everyone, welcome back to one of my sporadical blog posts. Due to some fortunate circumstances, I finally have the honor to name my…Jun 8, 2023Jun 8, 2023
A long way to SectopRatInvestigating a highly obfuscated stealer sampleJan 18, 2023A response icon1Jan 18, 2023A response icon1