All Intelligence

Malware

Malware analysis, reverse engineering findings, and detection guidance.

21 items

highMalwareActive

UNC6692 deploys Snow malware via Microsoft Teams social engineering, signalling expansion of platform-based attack delivery

Threat actor UNC6692 is using Microsoft Teams to socially engineer targets into executing a custom malware suite called Snow, which comprises a browser extension, tunneler, and backdoor. This represents a shift toward trusted communication platforms as malware delivery vectors, complicating detection and increasing organisational risk.

Microsoft Teams, Microsoft 365 users
highMalwareActive

Payouts King ransomware weaponises QEMU hypervisor for blind-spot evasion

Payouts King ransomware operators are deploying QEMU virtual machines as covert execution containers, using reverse SSH tunnels to maintain hidden command channels that bypass endpoint detection and response tools. This represents a maturation of VM-based evasion tactics in ransomware operations.

Systems running endpoint detection and response (EDR) solutions, Windows hosts with QEMU installation capability
highMalwareContained

RedLine Infostealer Administrator Arrested: Law Enforcement Disrupts Malware-as-a-Service Operation

Hambardzum Minasyan, an Armenian national allegedly involved in developing and administering the RedLine infostealer, has been extradited to the United States. This arrest represents a significant enforcement action against a malware-as-a-service operation that has compromised thousands of organisations globally.

Organisations using compromised credentials, Enterprise networks, Financial institutions