Downloads & Reports

  • Home
  • About Us
  • Downloads & Reports
image
  • Sohaib Saif
  • 01 Sept 2023

Threat Report: Lazarus

This report documents the threat group Lazarus and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.

image
  • Aidan Matthews
  • 13 July 2023

Threat Report: PowerDrop PowerShell Attack On Aerospace Industry

This report documents the lifecycle of the PowerDrop Malware and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.

image
  • Nathan Long
  • 22 April 2022

Threat Report: Lapsus$

This report documents the threat group Lapsus$ and their TTPs (Tactics, Techniques and Procedures), and contains recommendations to help detect and mitigate the emerging threat. The report also includes references to where the information within this report was identified from.

image
  • Tamzin Greenfield
  • 04 March 2022

Threat Hunting Report – HermeticWiper

The purpose of this report is to document the current form and methodologies used by the HermeticWiper malware. The information documented is then used by Cyber Security Associates Ltd (CSA) Cyber Analysts to hunt for the threat within the client environment through the use of our supported SIEMs, BorderPoint and LogRhythm, and advise on countermeasures to monitor and detect for the subject threat.

image
  • Cyber Security Associates Ltd
  • 11 December 2021

Log4Shell: log4j Remote Code Execution

On the 9th December 2021, a 0-day exploit was discovered in the Java logging library log4j2. The Remote Code Execution (RCE) vulnerability allows an adversary to send a specially crafted string to a vulnerable application resulting in commands run by the server.

image
  • Tamzin Greenfield
  • 22 November 2021

FBI Email Server Compromise

A genuine FBI/DHS email address was observed mass-sending emails to thousands of addresses scraped from a breached database, this report delves into what and how it happened.

  • Zachary Goggins
  • 11 October 2021

THreat Hunting Report: AvosLocker Ransomware

The purpose of this report is to document the current form and methodologies used by the AvosLocker Ransomware.

image
  • Zachary Goggins
  • 13 April 2021

Threat Hunting Report: Android Malware Rogue

The purpose of this report is to document the current form and methodologies used by the Rogue Malware.

image
  • Zachary Goggins
  • 19 February 2021

Threat Hunting Report – Zeoticus 2.0 Ransomware

The purpose of this report is to document the current form and methodologies used by the Zeoticus 2.0 Ransomwaret

image
  • Zachary Goggins
  • 08 January 2021

Threat Hunting Report – Babuk Locker Ransomware

The purpose of this report is to document the current form and methodologies used by the Babuk Locker Ransomware.

image
  • Cyber Security Associates Ltd
  • 13 January 2021

White Paper: Staying Cyber Safe when working From home

Cyber attacks are still a potential threat when working remotely so it’s important to stay vigilant! This White Paper will help you practice good cyber-hygiene outside of the office environment.