Other Cybersecurity Reports

The HC3 website is the next step in reaching our mission of supporting the defense of the healthcare and public health sector’s information technology infrastructure, by strengthening coordination and information sharing within the sector and by cultivating cybersecurity resilience, regardless of…
Dridex was originally developed as a financial Trojan that initially makes contact with its victims via phishing/spam email campaigns.
LokiBot Malware Threat to Healthcare, June 16, 2020 Lokibot is an information stealer; the main functionality of its binary is to collect system and application credentials and user information to send back to the attacker.
Lokibot is an information stealer; the main functionality of its binary is to collect system and application credentials and user information to send back to the attacker.
Remcos RAT, or remote access tool, is a legitimate application intended for use by administrators for remote access and maintenance. It has recently been used as part of attempted cyberattacks, leveraging COVID-related phishing themes to disguise it as part of the payload.
Dridex was originally developed as a financial Trojan that makes initial contact with its victims via phishing email campaigns and is one of the most prevalent malwares in use today.
Ursnif (aka Gozi, Gozi-ISFB, Dreambot, Papras) is a modified modular banking malware with backdoor capabilities.
This guide provides participants with instructions and helpful tips for the Health Sector Cybersecurity Coordination Center (HC3) Cybersecurity Threat Briefing Series, hosted via WebEx.