Unit 42 Palo Alto Networks
- Threat Brief: Escalation of Cyber Risk Related to Iran (Updated June 26)by Unit 42 on June 25, 2025 at 6:00 pm
Unit 42 details recent Iranian cyberattack activity, sharing direct observations. Tactical and strategic recommendations are provided for defenders. The post Threat Brief: Escalation of Cyber Risk Related to Iran (Updated June 26) appeared first on Unit 42.
- Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sectorby Tom Fakterman and Guy Levi on June 24, 2025 at 10:00 pm
Cybercriminals are targeting financial organizations across Africa, potentially acting as initial access brokers selling data on the dark web. The post Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector appeared first on Unit 42.
- Resurgence of the Prometei Botnetby Lee Wei Yeong and Pranay Kumar Chhaparwal on June 20, 2025 at 10:00 am
We identified a resurgence of the Prometei botnet’s Linux variant. Our analysis tracks the activity of this cryptominer and its new features. The post Resurgence of the Prometei Botnet appeared first on Unit 42.
- Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementationby Dominik Reichel on June 17, 2025 at 10:00 am
We analyze two new KimJongRAT stealer variants, combining new research with existing knowledge. One uses a Portable Executable (PE) file and the other PowerShell. The post Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation appeared first on Unit 42.
- Serverless Tokens in the Cloud: Exploitation and Detectionsby Zohar Zigdon on June 13, 2025 at 10:00 am
Understand the mechanics of serverless authentication: three simulated attacks across major CSPs offer effective approaches for application developers. The post Serverless Tokens in the Cloud: Exploitation and Detections appeared first on Unit 42.
- JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Techniqueby Hardik Shah, Brad Duncan and Pranay Kumar Chhaparwal on June 12, 2025 at 10:00 am
In an extensive campaign affecting 270k webpages, compromised websites were injected with the esoteric JavaScript programming style JSF*ck to redirect users to malicious content. The post JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique appeared first on Unit 42.
- The Evolution of Linux Binaries in Targeted Cloud Operationsby Nathaniel Quist and Bill Batchelor on June 10, 2025 at 10:00 am
Using data from machine learning tools, we predict a surge in cloud attacks leveraging reworked Linux Executable and Linkage Format (ELF) files. The post The Evolution of Linux Binaries in Targeted Cloud Operations appeared first on Unit 42.
- Roles Here? Roles There? Roles Anywhere: Exploring the Security of AWS IAM Roles Anywhereby Itay Saraf on June 9, 2025 at 10:00 am
This examination of the Amazon Web Services (AWS) Roles Anywhere service looks at potential risks, analyzed from both defender and attacker perspectives. The post Roles Here? Roles There? Roles Anywhere: Exploring the Security of AWS IAM Roles Anywhere appeared first on Unit 42.
- Blitz Malware: A Tale of Game Cheats and Code Repositoriesby Dominik Reichel on June 6, 2025 at 10:00 am
Blitz malware, active since 2024 and updated in 2025, was spread via game cheats. We discuss its infection vector and abuse of Hugging Face for C2. The post Blitz Malware: A Tale of Game Cheats and Code Repositories appeared first on Unit 42.
- Lost in Resolution: Azure OpenAI’s DNS Resolution Issueby David Orlovsky on June 3, 2025 at 10:00 am
We discovered an Azure OpenAI misconfiguration allowing shared domains, potentially leading to data leaks. Microsoft quickly resolved the issue. The post Lost in Resolution: Azure OpenAI’s DNS Resolution Issue appeared first on Unit 42.
- How Good Are the LLM Guardrails on the Market? A Comparative Study on the Effectiveness of LLM Content Filtering Across Major GenAI Platformsby Yongzhe Huang, Nick Bray, Akshata Rao, Yang Ji and Wenjun Hu on June 2, 2025 at 10:00 pm
We compare the effectiveness of content filtering guardrails across major GenAI platforms and identify common failure cases across different systems. The post How Good Are the LLM Guardrails on the Market? A Comparative Study on the Effectiveness of LLM Content Filtering Across Major GenAI Platforms appeared first on Unit 42.
- Threat Brief: CVE-2025-31324 (Updated June 25)by Unit 42 on May 23, 2025 at 10:00 am
CVE-2025-31324 impacts SAP NetWeaver’s Visual Composer Framework. We share our observations on this vulnerability using incident response cases and telemetry. The post Threat Brief: CVE-2025-31324 (Updated June 25) appeared first on Unit 42.
- Threat Group Assessment: Muddled Libra (Updated May 16, 2025)by Kristopher Russo, Austin Dever and Amer Elsad on May 16, 2025 at 8:16 am
Muddled Libra continues to evolve. From social engineering to adaptation of new technologies, significant time is spent breaking down organizational defenses. The post Threat Group Assessment: Muddled Libra (Updated May 16, 2025) appeared first on Unit 42.
- DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoItby Pranay Kumar Chhaparwal and Benjamin Chang on May 14, 2025 at 10:00 am
A new DarkCloud Stealer campaign is using AutoIt obfuscation for malware delivery. The attack chain involves phishing emails, RAR files and multistage payloads. The post DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt appeared first on Unit 42.
- Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resourcesby Lee Wei Yeong and Alex Armstrong on May 9, 2025 at 10:00 am
Unit 42 details a new malware obfuscation technique where threat actors hide malware in bitmap resources within .NET applications. These deliver payloads like Agent Tesla or XLoader. The post Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources appeared first on Unit 42.