Blog / Engineering / Detecting njRAT malware with Wazuh
njRAT, also known as Bladabindi, is a remote access trojan (RAT) designed to allow an attacker remotely control an infected Windows endpoints. The malware gained significant attention in 2020 after being distributed through a cracked version of VMWare software. As of August 2023, ANY.RUN reports that njRAT’s recent outbreak has established its position as one […]
Blog / Engineering / Chaos malware: Detecting using Wazuh
Check our new blog post to learn how to analyze the Indicators of Compromise (IOCs) of Chaos malware and mitigate the infection using Wazuh.
Blog / Engineering / How to detect RedLine Infostealer with Wazuh
In this blog post, we use Sysmon integration and the Wazuh security configuration assessment module to detect RedLine infostealer.
Blog / Engineering / Adversary emulation on GCP with Stratus Red Team and Wazuh
Google Cloud Platform (GCP) is a highly scalable cloud computing platform offered by Google. It provides organizations with several cloud-based services, including computing, storage, machine learning, and data analytics. GCP is renowned for its robust infrastructure, global network, and cutting-edge technologies, making it an ideal choice for businesses seeking to leverage the cloud for their […]
Blog / Engineering / Cloud Security Posture Management on Google Cloud Platform with Wazuh
Cloud Security Posture Management (CSPM) is important in ensuring the security and compliance of cloud environments. In cloud computing where organizations can quickly and easily provision, configure, and modify cloud resources, the potential for security misconfigurations increases. These security issues can arise due to mismanagement of permissions, gaps in network configurations, and various other factors. […]
Blog / Engineering / Cloud Security Posture Management on Microsoft Azure with Wazuh
Cloud Security Posture Management (CSPM) is essential to ensuring the security and compliance of cloud environments. In cloud computing, the potential for security misconfigurations is significantly high due to mismanagement of permissions, gaps in network configurations, and various other vulnerabilities. Cloud Security Posture Management addresses these challenges by continuously monitoring and assessing cloud workloads to […]
Blog / Engineering / Detecting and responding to Phobos ransomware using Wazuh
Phobos ransomware has become a growing concern due to its tactics in targeting state and territorial governments. The ransomware group compromises Windows endpoints using phishing as the primary method to gain initial entry, deploying covert payloads such as SmokeLoader and Cobalt Strike. Also, attackers exploit vulnerable networks by scanning and brute-forcing open Remote Desktop Protocol […]
Blog / Engineering / CHAVECLOAK malware detection and response with Wazuh
CHAVECLOAK malware is a Windows-based banking trojan that targets South American financial sector individuals to steal sensitive financial information. The malware is distributed through phishing emails with embedded malicious PDF attachments. CHAVECLOAK blocks user device screens, logs keystrokes, and shows fake pop-up windows. The malware monitors the victim’s endpoint and becomes active when it detects […]