Fortinet Threat Research.
FortiGuard Labs Threat Research Official blog feed of Fortinet
- New Remcos Campaign Distributed Through Fake Shipping Documenton January 14, 2026 at 2:00 pm
FortiGuard Labs analyzes a phishing campaign delivering a fileless Remcos RAT via malicious Word templates, CVE-2017-11882 exploitation, and in-memory execution.
- Uncovering Hidden Forensic Evidence in Windows: The Mystery of AutoLogger-Diagtrack-Listener.etlon December 9, 2025 at 2:00 pm
FortiGuard IR uncovers forensic insights in Windows AutoLogger-Diagtrack-Listener.etl, a telemetry artefact with untapped investigative value.
- UDPGangster Campaigns Target Multiple Countrieson December 4, 2025 at 2:00 pm
FortiGuard Labs uncovers UDPGangster campaigns linked to MuddyWater, using macro-laden phishing lures, evasion techniques, and UDP backdoors to target multiple countries
- New eBPF Filters for Symbiote and BPFdoor Malwareon December 2, 2025 at 2:00 pm
FortiGuard Labs discovered new Symbiote and BPFDoor variants exploiting eBPF filters to enhance stealth through IPv6 support, UDP traffic, and dynamic port hopping for covert C2 communication.
- ShadowV2 Casts a Shadow Over IoT Devices | FortiGuard Labon November 26, 2025 at 2:00 pm
ShadowV2, a new Mirai-based botnet targeting IoT devices, surfaced during the recent AWS outage. FortiGuard Labs examines its propagation, DDoS capabilities, and global footprint.
- Cyberthreats Targeting the 2025 Holiday Season: What CISOs Need to Knowon November 25, 2025 at 2:00 pm
Cybercriminal activity is surging ahead of the 2025 holiday season. Deceptive domains, stolen accounts, and e-commerce attacks are accelerating. Here’s what leaders need to know.
- Cloud Abuse at Scaleon October 31, 2025 at 1:00 pm
FortiGuard Labs analyzes TruffleNet, a large-scale campaign abusing AWS SES with stolen credentials and linked to Business Email Compromise (BEC).
- Stolen Credentials and Valid Account Abuse Remain Integral to Financially Motivated Intrusionson October 30, 2025 at 3:00 pm
FortiGuard IR analysis of H1 2025 shows financially motivated actors increasingly abusing valid accounts and legitimate remote access tools to bypass detection, emphasizing the need for identity-centric defenses.
- Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asiaon October 17, 2025 at 1:00 pm
FortiGuard Labs has tracked a hacker group expanding attacks from Mainland China to Malaysia, linking campaigns through shared code, infrastructure, and tactics.
- New Stealit Campaign Abuses Node.js Single Executable Applicationon October 10, 2025 at 1:00 pm
A new Stealit campaign uses Node.js Single Executable Application (SEA) to deliver obfuscated malware. FortiGuard Labs details tactics and defenses. Learn more.







