One Malware to rule them all

I’d like to bring to your attention a new and dangerous attack vector that is spreading malware through .ONE files. These files, also known as Microsoft OneNote files, may appear to be from a trusted source, but in reality, they can contain malwarel. In recent months, we have seen an increase in the number of threat actor groups utilizing .ONE files as a means to spread malware. Groups such as Async, Qakbot, and Redline are known to have used this technique to target individuals and organizations alike....

February 8, 2023 · 3 min · 457 words · CyberQuacker

A simple phish leads to a billion dollar company being breached

When we think of a company getting breached generally, people think of some advanced attack that took months of planning and execution. But in reality, most breaches are caused by simple mistakes. So in this post, I will be going over a breach that could likely happen in the future and how it could have been prevented. So let us start with the basics. What is a breach? A breach is when an adversary gains access to a system and steals data....

October 7, 2022 · 4 min · 829 words · CyberQuacker

About Me?

Publications The Art of Deception: Microsoft Phish Redirects Victims to a Catering Voice Recording Double Trouble: Unmasking The EPOS Net Phishing Scheme That Turns Trust Against You Technical C / Golang / Python. AWS, Azure, SQL, DyanmoDB, VMWare, Docker, K8, Terraform. Work History Ive worked in many fields… Im listing them from most recent to least recent. Current - Threat Analyst - Cofense: -Developed custom python scripts to reduce manual effort for APAC threat analysts, resulting in a daily time saving of 30 minutes per team member....

June 28, 2022 · 3 min · 429 words · CyberQuacker