Results for FortiGuards Labs

Industry Trends

COVID-19 Related Cyber Attacks Explained: Exploiting FUD

Learn from the FortiGuard Labs team how cybercriminals have been exploiting fear, uncertainty, and doubt during the COVID-19 pandemic to target organizations and individuals.

Industry Trends

Ransomware: Here Today, Here Tomorrow

Hear from three members of our FortiGuard Labs Team discuss the level of threat ransomware poses and what organizations should do about it now, while their networks are still in a state of flux.

Threat Research

Silence Group Playbook

Silence Group is a cybercriminal organization that targets banks, specifically stealing information used in the payment card industry. The aim of this playbook is to provide first responders with relevant, up-to-date analysis, samples, and indicators of compromise which should help security professionals better protect their infrastructures.

By FortiGuard SE TeamApril 15, 2019

Threat Research

LockerGoga: Ransomware Targeting Critical Infrastructure

LockerGoga is not at all exceptional in terms of sophistication, especially when compared to other ransomware families. However, it has a unique way of iterating through the files of the victim.

Threat Research

Patch Your Adobe Shockwave Player: Fortinet Discovers Seven Zero-Day Remote Code Execution Vulnerabilities

Adobe released security bulletin APSB19-20, which patches seven Adobe Shockwave Player vulnerabilities. All of them were discovered by FortiGuard Labs researcher Honggang Ren and reported to Adobe by following Fortinet’s responsible disclosure process.

By Honggang RenApril 11, 2019

Industry Trends

Q4 Threat Report: 2018 Attacks Highlighted the Need for Advanced Threat Intelligence

Learn about key threat findings from Fortinet's Q4 2018 Threat Landscape Report and what they mean for security teams today.

By Jeannette JarvisMarch 04, 2019

Threat Research

A Look into XPC Internals: Reverse Engineering the XPC Objects

We have recently been engaged in deep security research on macOS for FortiGuard Labs focused on the discovery and analysis of IPC vulnerabilities. In this blog, we uncover the XPC internals data types to help researchers not only quickly analyze the root causes of XPC vulnerabilities, but to also assist with deep analysis of exploits targeted at those vulnerabilities.

By Kai LuDecember 14, 2018

Threat Research

Cookie Maker: Inside the Google Docs Malicious Network

FortiGuard Labs recently discovered a running Google Docs malware campaign that uses the names of Fortinet and FortiGuard. When we examined the documents, we encountered a long chain of redirects inside a malicious network, and the destination of this chain was dependent on our IP and the user-agent that was used. This malicious network targets all major platforms: Windows, Android, and MacOS.

By Artem SemenchenkoNovember 21, 2018

Threat Research

The Sony Smart TV Exploit: An Inside View of Hijacking Your Living Room

More and more Smart TVs are connected to the Internet than ever before, with an estimated 760 million of them now connected globally. As new threats increasingly target IoT devices, such as Smart TVs, that include always-on connectivity and high-performance GPUs that can be hijacked for malicious purposes, FortiGuard Labs took the opportunity to look at the current security status of these devices.

By Tony LoiOctober 04, 2018

Threat Research

FakeSpy Comes Back. New Wave Hits Japan

FortiGuard Labs recently encountered malicious traffic traveling to a C2 server located in China. The connection was established by a domain using a name that closely resembled one of Japan’s most famous express post delivery services. Our analysis showed that the website making this connection is fake, and moreover, it is spreading an Android malware.

By Dario Durando, Evgeny AnaninOctober 02, 2018