Blog / Engineering / LimeRAT detection and response with Wazuh
...following LimeRAT YARA rules: rule win_limerat { meta: author = "Iseoluwa Titiloye Oyeniyi" date = "2023-04-05" description = "detects LimeRAT executable" malpedia_family = "win.limerat" tlp = "TLP:WHITE" version = "v1.0"...
Blog / Engineering / Meduza Stealer detection and mitigation with Wazuh
...as browser cookies, histories, crypto wallet information, and more from infected machines." author = "Iseoluwa Titiloye Oyeniyi" version = "1" strings: $x1 = "autofill-profiles.json" ascii wide $x2 = "formhistory.sqlite" ascii...
Blog / Engineering / How to detect and mitigate Panchan botnet using Wazuh
Panchan is a new botnet written in Golang. It leverages built-in Golang goroutines features for flexibility in the malware infection and execution within Linux distributions. It infects Linux endpoints on...
Blog / Engineering / Detect Lightning Framework malware using Wazuh
Lightning Framework is a robust malware framework that consists of various modules and plugins with diverse capabilities, including the ability to download and install multiple types of rootkits. The framework...
Blog / Engineering / OpenSSL 3.0 vulnerability audit using Wazuh
OpenSSL is a popular open source cryptography library. Applications that secure communication over computer networks use OpenSSL to implement SSL (Secure Socket Layer) and TLS (Transport Layer Security). OpenSSL provides...
Blog / Engineering / Monitoring Linux resource usage with Wazuh
Monitoring Linux resources is crucial to optimizing performance and also to maintain the security of an organization’s data and network. Maintaining the health of a computer system is important for...
Blog / Engineering / Nmap and ChatGPT security auditing with Wazuh
Nmap (network mapper) is an open source security scanner used for network exploration and security auditing. It identifies endpoints and services within a network and provides a comprehensive network map....