Skip to content

    Revealing Emperor Dragonfly: Night Sky and Cheerscrypt - A Single Ransomware Group

        Key Takeaways Sygnia recently investigated a Cheerscrypt ransomware attack which utilized Night Sky ransomware TTPs. Further analysis       revealed that Cheerscrypt and...

    Read More

    Threat Hunting (2)

      Filter by Topic

      Featured Incident Response Threat Hunting

      Sygnia Advisory: Key Takeaways Leak of Conti crime group information

      The ongoing war between Russia and Ukraine has led to a wide range of impacts and outcomes globally, and across industries. In the cyber domain, one of the most recent... Read More
      Featured Incident Response Threat Hunting

      Breaking Down the Casbaneiro Infection Chain

      Background In 2018, the Casbaneiro banking Trojan (also referred to as Metamorfo) surfaced in mass MalSpam campaigns targeting Latin America. The primary objective, based on... Read More
      Featured Incident Response Threat Hunting

      Sygnia Advisory: Potential Okta Breach

      executive summary On March 22nd, 2022, the LAPSUS$ threat group published potential evidence of a successful breach of Okta, a widely used identity provider. This... Read More
      Featured Incident Response Threat Hunting

      Advisory: Russia–Ukraine Conflict Escalation

      executive summary As we continue to closely monitor the unfolding conflict between Russia and Ukraine, we're publishing this advisory to support global organizations. The... Read More
      Featured Incident Response Threat Hunting

      End-to-End LOG4SHELL Hunting Strategy

      Log4j2 is a widely used open-source Java logging library developed by the Apache foundation. On December 9, 2021 a critical unauthenticated remote code execution... Read More
      Incident Response Threat Hunting

      Sygnia Advisory: Log4Shell Remote Code Execution

      Updated - December 17, 2021 On December 9, a critical remote code execution (RCE) vulnerability in Java logging library Apache Log4j was made public. The vulnerability,... Read More