Threat Analysis

Analysis of latest cyber threats

MalasLocker is a Novel Twist on Ransomware Tactics

MalasLocker is a novel ransomware operation that has been active since the end of March 2023. It targets Zimbra servers, exfiltrating email data and encrypting files. Unlike traditional ransomware, MalasLocker doesn’t demand a direct ransom payment but requires the victim to make a donation to an approved non-profit charity. They

Read More
Analysis of latest cyber threats

Volt Typhoon and the Importance of Proactive Cyber Defense

In the ever-evolving landscape of cyber threats, a new storm is brewing. The state-sponsored actor, Volt Typhoon, has been quietly infiltrating critical infrastructure organizations in the United States since mid-2021. This group, based in China, is known for its stealthy techniques and focus on espionage and information gathering. Their modus

Read More

APT28 Potentially Exploiting MOVEit Zero Day

The DeepSeas cyber threat intelligence crew has observed exploitation of a zero-day exploit in US-based Progress’s MOVEit Managed File Transfer Software service. Further investigation by DeepSeas has uncovered a possible overlap with infrastructure known to be operated by the Russian state-aligned advanced persistent threat group Fancy Bear (aka APT28). Whether

Read More
Analysis of latest cyber threats

Cloud to Firmware Exploitation Revealed by Otorio’s Research

The Cloud to Firmware exploitation revealed by Otorio’s Research can be viewed as a chain in the same way so many cybersecurity events are described, showing that a cybersecurity program’s strength is often determined by its weakest link. In the case at hand, the links are represented by a collection

Read More

The Best Threat Intelligence Programs Answer these 3 Questions

Questions related to how security leaders can create the best threat intelligence programs for their organizations were recently covered in an episode of Cybersecurity America with Josh Nicholson. While there are many questions an organization should address when adopting a threat intelligence program, below are three of the many that

Read More

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly A DeepSeas Summary DeepSeas has identified a new technique involving the use of OneNote files in malware delivery, though activity of this nature was observed to have accelerated among cybercriminal groups in December 2022. The use of this new filetype has

Read More

Join our Team

21% of the DeepSeas crew are Veterans or Active Military Reservists. Join our talented crew of cyber experts.

The DeepSeas are calling. Schedule your virtual consult.

You pick the time and day. We'll be ready to answer your questions.