Find the latest threat intelligences direct from AhnLab’s security experts
This analysis report details the overall attack pattern for Shadow Force Group from 2020 to 2022.
Mar 27, 2023 Read MoreThis analysis report shows significant change in threat activities of Kimsuky group compared to January through statistical data.
Mar 29, 2023 Read MoreThis report analyzes threat activities of Kimsuky group in 2023, focusing on 3 types of malware.
Mar 16, 2023 Read MoreThis report analyzes threat activities of Kimsuky group, particularly those utilizing FlowerPower and AppleSeed malware.
Feb 27, 2023 Read MoreThis analysis report will discuss the distribution of CHM malware assumed to have been created by North Korean threat actor Kimsuky group.
Mar 13, 2023 Read MoreThis analysis report reviews the installation of PlugX malware through Sunlogin and Awesun's remote code execution vulnerability.
Mar 9, 2023 Read MoreThis analysis report aims to share the anti-forensic traces and details found in the systems that were infiltrated by the Lazarus group.
Feb 23, 2023 Read MoreThis report investigates ransomware trends according to region and examines the different attack methods.
Feb 14, 2023 Read MoreThis report will discuss the Dalbit,m00nlight APT attack campaign conducted by Chinese hackers, including the main methods used.
February 23, 2023 Read MoreThis report analyzes malware distributed via Microsoft OneNote, which is a rapidly increasing trend.
Jan 30, 2023 Read MoreThis report investigates NetSupport RAT malware being distributed from a phishing page for a Pokemon card game.
Jan 6, 2023 Read MoreThis report examines Linux malware developed with Shc that has been installing a CoinMiner.
Jan 4, 2023 Read MoreIn this article, AhnLab looks back at the Top 10 Cyber Threat Trends of 2022 and predicts upcoming trends for 2023.
Dec 15, 2022 Read MoreThis article covers ransomware trends over the last two years, including notable characteristics of major ransomware groups.
Dec 6, 2022 Read MoreThis report examines the vulerabilities of Active Directory Domain Services and methods to mitigate them.
Oct 20, 2022 Read MoreThis report analyzes Lazarus Group’s Rootkit attack method using BYOVD performed on vulnerable driver modules.
Sep 22, 2022 Read MoreThis article will discuss the principles behind Infostealer exploiting automatic login features and share ways to minimize damage.
Sep 5, 2022 Read MoreThis report analyzes vulnerable Atlassian Confluence servers that can result in OGNL injection attacks.
Aug 11, 2022 Read MoreThis report examines LuoYu Group's attack methods and major malware utilized by the group, including WinDealer.
Aug 10, 2022 Read MoreThis report will analyze the Follina zero-day vulnerability exploited through the Microsoft Support Diagnostic Tool(MSDT).
Jun 27, 2022 Read MoreThis article analyzes recent trends of Dark Web and Deep Web, based on ransomware, black markets, and hacking groups.
Jun 7, 2022 Read MoreThis analysis report presents cases of Conti Ransomware attacks, major tooles used, and related issues in detail.
May 18, 2022 Read MoreThis report introduces Operation Triple Tiang, a cyber attack mission targeting South Korean fields of politics and foreign affairs.
Mar 31, 2022 Read MoreThis analysis report examines the malicious activities of Kimsuky Group during the year 2021, including detailed cases and targets.
Jan 28, 2022 Read MoreThis analysis report focuses on types of malware recently utilized by the Kimsuky group, including AppleSeed and PebbleDash.
Jan 5, 2022 Read MoreThis article takes a closer look at the top 5 cybersecurity threats in 2022 and shares security issues to watch out for in the new year.
Jan 4, 2022 Read MoreThis report details the Log4Shell vulnerability executed in the Apache Log4j 2 library.
Dec 13, 2021 Read MoreThis article will analyze the characteristics, damage, and attack process of BlackMatter ransomware.
Nov 2, 2021 Read MoreThis report describes the malicious activities of the APT Group Mustang Panda and its attack methods.
Aug 20, 2021 Read MoreTeamTnT is a threat actor continuously attacking cloud environments since 2020. This report introduces the group's tactics and procedures.
Jul 29, 2021 Read MoreThis report will review the significant security threats of 2020 and share predictions for 2021 based on the relevant data analysis.
Jan 7, 2021 Read MoreThis analysis report will examine the top five malicious applications being used for sextortion scams.
Jul 6, 2020 Read MoreThis analysis report will examine Operation Shadow Force that had been hidden behind legitimate certificates for the last seven years.
Apr 7, 2020 Read MoreThis analysis report will examine the recent malicious activities of Magniber from changes in exploited vulnerability to shellcode.
Mar 2, 2020 Read MoreThis analysis report presents the kill-chain, primary functions, and internal proliferation methods of Lemon Duck in full detail.
Dec 19, 2019 Read MoreThis report describes the latest attacks by Kimsuky Group including main methods, and changes in their purpose and targets.
Feb 28, 2019 Read More