Tech Report



Threat Analysis

Operation Shadow Force

This analysis report will examine Operation Shadow Force that had been hidden behind legitimate certificates for the last seven years.

PDF Downloads

In-depth Analysis

The Evolution of Magniber Ransomware

This analysis report will examine the recent malicious activities of Magniber ransomware from changes in exploited vulnerability to shellcode.

PDF Downloads

Issue Report

  • Sour Lemon Duck: PowerShell Malware Exploiting SMB Vulnerability

    This analysis report presents the kill-chain, primary functions, and internal proliferation methods of Lemon Duck in full detail.

    PDF Downloads
  • Operation Kabar Cobra: Tenacious cyber-espionage by Kimsuky

    This report describes the latest attacks by Kimsuky Group including main methods, and changes in their purpose and targets.

    PDF Downloads
  • Full Discloser of Andariel, a Subgroup of Lazarus Threat Group

    This report describes the several cyberattacks by Andariel Threat Group including main methods, and changes in their purpose and targets

    PDF Downloads
  • Detailed Analysis of Red Eyes Hacking Group

    This report takes a closer look at the main activities of Red Eyes and another group that may be affiliated with it.

    PDF Downloads
  • Analysis Report on Attacks Targeting South Korea

    This report shows attacks targeting South Korea; attack method and hacking groups.

    PDF Downloads
  • Targeted Attacks on Defense Industry

    This report presents analysis of attacks on defense industry which can be serious concerns to national security.

    PDF Downloads
  • Analysis Report on WannaCryptor

    This report presents analysis on WannaCryptor, also known as WannaCry and Wcrypt, which has quickly spread worldwide.

    PDF Downloads
  • Ransomware Trends to Watch

    This report presents ransomware trends that have evolved more quickly and become more diverse since 2016.

    PDF Downloads