Years ago, colleagues from Yandex introduced the concept of Mayhem infections. In that post, they provided very detailed information about the malware, its functionalities and…
Attackers often aim to conceal their presence using different methods, such as injecting redirect scripts, creating spam pages, or hiding a mailer in checkout pages…
Recently, during an incident response process, we worked on an interesting Magento website. This site was reported to having a strange redirection when users visited…
During an incident response investigation, we detected an interesting backdoor that was small but had the potential to give the attacker full access to your…
When talking about compromised environments, we often think that the website itself is the end goal but that’s not always true. In some cases, attackers…
A mobile malware is a malicious software that targets mobile/smartphones, tablets and similar devices. The attacks may vary from fatal damage to the OS (bricking)…
Most malware and spam that we come across has some sort of discernable purpose to it, usually something which benefits the attackers financially. This is…
Backdoors are found in 72% of infected websites, according to our latest reports. Backdoors are files left on the server by attackers in order to retain…