Experienced a breach?ContactBlogSign In

GET A DEMO

Tag: jscript


  • Spear-phishing campaign leveraging on MSXSL

    Spear-phishing campaign leveraging on MSXSL

    Published 4 years ago

    We have identified an ongoing spear-phishing campaign targeting a variety of entities with malicious RTF documents exploiting three different vulnerabilities: CVE-2017-8570, CVE-2017-11882 and CVE-2018-0802 and taking advantage of a misplaced trust binary, Microsoft’s msxsl, to run a JScript backdoor. The whole attack chain leverages on system’s signed components to remain under the radar as much as possible and it shares many …

    Continue reading “Spear-phishing campaign leveraging on MSXSL”

  • A dive into MuddyWater APT targeting Middle-East

    A dive into MuddyWater APT targeting Middle-East

    Published 4 years ago

    MuddyWater is a threat actor that caught our attention for their extensive use of “Living off the Land” attacks in a targeted campaign aimed at the Middle East. During our investigation we reconstruct the evolution of the vectors used and how the group operates to  target their victims, evade detections and move laterally inside the compromised …

    Continue reading “A dive into MuddyWater APT targeting Middle-East”


Solutions
  • Overview
  • ReaQta-Hive
  • ReaQta-MDR
Partners
  • Sign In
  • Apply Now
  • For MSSP's
  • Resellers
Resources
  • Blog
  • Events
  • Resources Library
Company
  • Why ReaQta?
  • About Us
  • Careers
  • News
Global Headquarters
Molenpad 6
1016 GM, Amsterdam
Netherlands
Regional Headquarters
6A Upper Cross Street
Singapore 058326

Copyright ReaQta © 2022Privacy Policy