Hybrid Analysis Blog

IT security blog focusing on malware forensics, dynamic and static analysis, as well as automated malware analysis techniques.

Thursday, November 6, 2025

LeakyInjector and LeakyStealer Duo Hunts For Crypto and Browser History

›
 Author(s): Vlad Pasca, Radu-Emanuel Chiscariu New two-stage malware targets cryptocurrency wallets and browser history LeakyInjector uses l...
Thursday, October 30, 2025

A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities

›
Author(s): Vlad Pasca Warlock ransomware was deployed by exploiting the SharePoint vulnerabilities CVE-2025-53770 and CVE-2025-53771 The ma...
›
Home
View web version
Powered by Blogger.