Unmasking Spyware Based on SpyMax Targeting Chinese Citizens

Unmasking Spyware Based on SpyMax Targeting Chinese Citizens

Reports Reports Spyware Based on SpyMax Download Report The detected and analyzed APK named “检察院” (Chinese Prosecutor’s Office) is a highly dangerous mobile threat identified as an advanced variant of the SpyMax/SpyNote family. The malware is a comprehensive spyware package that impersonates the Supreme People’s Procuratorate of the People’s Republic of China and targets Chinese-speaking […]

Indonesia Country Report, 2025 March

Indonesia Country Report, 2025 March

Reports Reports Indonesia Country Report, 2025 March Download Report ThreatMon provides comprehensive cybersecurity solutions designed to help organizations mitigate cyber risks. By integrating Threat Intelligence, External Attack Surface Management, and Digital Risk Protection, ThreatMon enables businesses to shift from reactive security measures to proactive threat prevention. With Indonesia’s cybersecurity landscape becoming increasingly complex, ThreatMon supports […]

Ransomhub Group & New Betruger Backdoor | Technical Malware Analysis Report

Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report

Reports Reports Ransomhub Group ve Yeni Betruger Arka Kapısı Download Report RansomHub is a ransomware group that targets organizations worldwide, encrypting their data and demanding payment for decryption. Operating as a Ransomware-as-a-Service (RaaS) platform, the group collaborates with affiliates who carry out attacks using RansomHub’s tools and infrastructure. In addition to encrypting data, RansomHub threatens […]

Raton / Silly – Remote Access Trojan | Technical Malware Analysis Report

Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report

Reports Reports Technical Malware Analysis Report Download Report As ThreatMon, we strive to prevent potential malicious activities by informing individuals, companies, firms, institutions, and organizations about current threats through our reports, posts, and analyses. Raton Access Tool (SillyRAT) is a highly capable open-source Remote Access Trojan (RAT) developed in C#. It provides cybercriminals with a […]

How to Detect and Respond to Stealer Log Incidents: 10 Tips

Stealer Log Incidents

Blog Stealer log .. This article is about ‘How to Detect and Respond to Stealer Log Incidents: 10 Tips’ Introduction Stealer logs are a growing cybersecurity threat, leaking sensitive data like login credentials, session cookies, and financial information. Instead of breaking in, cybercriminals increasingly rely on stolen data to gain unauthorized access. The good news? […]

Google Chrome DLL SIDE LOADING METHOD

Google Chrome DLL SIDE LOADING METHOD

Reports Reports Google Chrome DLL Side Loading Method Download Report Key findings reveal this attack specifically targets Chrome’s DLL mechanism through the manipulation of chrome_elf.dll, with evidence of active trading on dark web forums. The malware uses Chrome’s GetInstallDetailsPayload function as an entry point and incorporates sophisticated evasion tactics including VM/sandbox detection and anti-debugging techniques. […]