vebula logo
Tech Blog & Insights

Exploring the Future of Technology

Welcome to our tech blog—your source for the latest trends, insights, and breakthroughs in technology. Join us as we explore the future, one post at a time.

100+
Articles
25+
Topics Covered
10+
Expert Writers
 ADVANCED PERSISTENCE THREATS ON ASIAN COUNTRIES INCLUDING SRI-LANKA
FEATURED THREAT REPORT
November 23, 2024

ADVANCED PERSISTENCE THREATS ON ASIAN COUNTRIES INCLUDING SRI-LANKA

Threat Actors often leverage domain-based infrastructure to host and facilitate malicious operations. When actors deploy these new domains, they often leave patterns that can be used to signature the infrastructure and link it to past known activity.

Latest Intelligence Reports

MALWARE AS A SERVICE OPERATION USING DCRAT & ASYNC-RAT
December 4, 2024

MALWARE AS A SERVICE OPERATION USING DCRAT & ASYNC-RAT

The investigation revealed a sophisticated Malware-as-a-Service (MaaS) operation leveraging the Kodiak open-source Command and Control (C2) framework to deploy Remote Access Trojans (RATs) and associated payloads. Analysts uncovered critical intelligence, including the identification of malicious IP addresses, open ports with RAT indicators, and operational missteps by the threat actor, such as exposing their username in SSL/TLS certificate fields.