Musaab Faisal

Threatcure: Analysis of Operation Cobalt Whispe

Threat OverviewInitial Attack VectorThe attackers distribute malicious RAR archive files across multiple platforms, often embedded with:• Decoy documents (to create legitimacy)• Malicious LNK files (shortcut files)• Batch scripts that decode and execute the payloadThese LNK files, when clicked, initiate a multi-stage infection chain, culminating in the in-memory execution of a Cobalt Strike beacon.________________________________________Tactics, Techniques, and […]

Threatcure: Analysis of Operation Cobalt Whispe Read More »

Threatcure: Analysis of FamousSparrow APT Group and Its Advanced Cyber-Espionage Campaigns

Overview of FamousSparrow APT GroupThe FamousSparrow APT (Advanced Persistent Threat) group, which has been active since at least 2019, has recently resurfaced after a period of dormancy following 2022. Notably, the group is known for its highly sophisticated cyber-espionage activities, primarily targeting entities in the financial, governmental, and research sectors. Recent investigative findings have revealed an ongoing series

Threatcure: Analysis of FamousSparrow APT Group and Its Advanced Cyber-Espionage Campaigns Read More »

ThreatCure: Analysis Report on Poco RAT Malware Linked to Dark Caracal

Overview of Poco RATPoco RAT (Remote Access Trojan) is a sophisticated malware designed to give attackers full control over compromised systems, enabling them to engage in various espionage activities. This malware has been deployed in targeted campaigns, primarily aimed at Spanish-speaking organizations in Latin America. The threat group responsible for this malware is the infamous

ThreatCure: Analysis Report on Poco RAT Malware Linked to Dark Caracal Read More »

ThreatCure: Analysis of AridSpy Android Spyware Campaign by Arid Viper APT Group

Executive SummarySecurity researchers have uncovered a sophisticated espionage campaign conducted by the Arid Viper APT (Advanced Persistent Threat) group, deploying a multistage Android spyware named AridSpy. The campaign primarily targets users in Egypt and Palestine, though it has impacted over 113,000 unique victims globally. The malware is distributed through trojanized applications masquerading as legitimate services,

ThreatCure: Analysis of AridSpy Android Spyware Campaign by Arid Viper APT Group Read More »

Analytical Report: Pegasus Spyware Deployments Targeting WhatsApp in January 2025

Executive SummaryIn January 2025, new reports emerged detailing Pegasus spyware deployments leveraging zero-click vulnerabilities in WhatsApp. Despite previous patches, sophisticated threat actors continue to exploit unknown or adapted vulnerabilities to compromise high-profile targets, such as government officials and business executives. This report analyzes the attack methodology, the vulnerabilities exploited, and recommendations for mitigating such threats.

Analytical Report: Pegasus Spyware Deployments Targeting WhatsApp in January 2025 Read More »

ThreatCure Analytical Report: Funksec Ransomware

Overview: Funksec, also known as Funklocker, is a ransomware group that emerged in late 2024. The group has targeted multiple organizations, employing sophisticated techniques to encrypt data, disrupt operations, and extort victims. Once systems are infiltrated, the ransomware encrypts files and appends them with a “.funksec” extension. Victims are presented with a ransom note demanding payment

ThreatCure Analytical Report: Funksec Ransomware Read More »

ThreatCure | Analytical Report on Mirai Botnet

OverviewFirst uncovered in August 2016 by MalwareMustDie, the Mirai botnet is a significant threat targeting Linux-based devices and IoT systems, including IP cameras, routers, and other embedded devices. The botnet’s name, “Mirai,” meaning “future” in Japanese, highlights its enduring relevance in the cybersecurity landscape. Mirai spreads by exploiting devices with weak or default credentials, integrating

ThreatCure | Analytical Report on Mirai Botnet Read More »

ThreatCure Analysis Report on NetWalker Ransomware Group

Overview NetWalker is a notorious ransomware group that emerged in late 2019, gaining infamy for its sophisticated double extortion tactics. This group encrypts victim data and exfiltrates sensitive information, leveraging the threat of public exposure to coerce ransom payments. NetWalker’s operations reveal a high level of technical expertise and adaptability, making it a persistent threat

ThreatCure Analysis Report on NetWalker Ransomware Group Read More »