We discuss hot topics, malware behavior, techniques, practices for analyzing malicious files, and of course, we will talk more about our online interactive sandbox.| ANY.RUN's Cybersecurity Blog
Editor’s note: The current article is authored by Mauro Eldritch, offensive security expert and threat intelligence analyst. You can find Mauro on X. North Korean state-sponsored groups, such as Lazarus, continue to target the financial and cryptocurrency sectors with a variety of custom malware families. In previous research, we examined strains like InvisibleFerret, Beavertail, and OtterCookie, often […] The post PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance an...| ANY.RUN's Cybersecurity Blog
Explore in-depth technical analysis of OtterCookie, a new North Korean Lazarus APT malware that steals victims' crypto and credentials.| ANY.RUN's Cybersecurity Blog
Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Welcome to the Malware Analysis section. We tell you about the principles and approach to the analysis, useful cases and examples, new samples, and analytics.| ANY.RUN's Cybersecurity Blog