Unit 42 Palo Alto Networks
- Threat Brief: CVE-2025-0282 and CVE-2025-0283 (Updated Jan. 17)by Unit 42 on January 17, 2025 at 12:30 am
CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident response case. The post Threat Brief: CVE-2025-0282 and CVE-2025-0283 (Updated Jan. 17) appeared first on Unit 42.
- One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networksby Nabeel Mohamed, Keerthiraj Nagaraj, Billy Melicher, Shehroze Farooqi, Alex Starov, Brady Stout and Robert Davis on January 14, 2025 at 11:00 am
Graph neural networks aid in analyzing domains linked to known attack indicators, effectively uncovering new malicious domains and cybercrime campaigns. The post One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks appeared first on Unit 42.
- Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capabilityby Yongzhe Huang, Yang Ji, Wenjun Hu, Jay Chen, Akshata Rao and Danny Tsechansky on December 31, 2024 at 11:00 pm
The jailbreak technique “Bad Likert Judge” manipulates LLMs to generate harmful content using Likert scales, exposing safety gaps in LLM guardrails. The post Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability appeared first on Unit 42.
- Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScriptby Lucas Hu, Shaown Sarker, Billy Melicher, Alex Starov, Wei Wang, Nabeel Mohamed and Tony Li on December 20, 2024 at 11:00 am
This article demonstrates how AI can be used to modify and help detect JavaScript malware. We boosted our detection rates 10% with retraining. The post Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript appeared first on Unit 42.
- Effective Phishing Campaign Targeting European Companies and Organizationsby Shachar Roitman, Ohad Benyamin Maimon and William Gamazo on December 18, 2024 at 8:00 am
A phishing campaign targeting European companies used fake forms made with HubSpot’s Free Form Builder, leading to credential harvesting and Azure account takeover. The post Effective Phishing Campaign Targeting European Companies and Organizations appeared first on Unit 42.
- LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directoryby Stav Setty, Shachar Roitman and Tom Fakterman on December 17, 2024 at 11:00 pm
Using real-world examples and offering plenty of pragmatic tips, learn how to protect your directory services from LDAP-based attacks. The post LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory appeared first on Unit 42.
- Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integrationby Ofir Balassiano and David Orlovsky on December 16, 2024 at 11:00 pm
Vulnerabilities in Microsoft Azure Data Factory’s integration with Apache Airflow can lead to unauthorized access and control over cloud resources. The post Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integration appeared first on Unit 42.
- Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operationby Jerome Tujague and Daniel Bunce on December 13, 2024 at 11:00 pm
Analysis of packer-as-a-service (PaaS) HeartCrypt reveals its use in over 2k malicious payloads across 45 malware families since its early 2024 appearance. The post Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operation appeared first on Unit 42.
- Network Abuses Leveraging High-Profile Events: Suspicious Domain Registrations and Other Scamsby Shu Wang, Zhanhao Chen, Chi-Wei Liu, Shunyao Yang, Zhenyu Mao, Shireen Hsu, Fan Fei, Daiping Liu, Xing Wang and Jiaqi Wu on December 6, 2024 at 11:00 pm
Unit 42 probes network abuses around events like the Olympics, featuring case studies of scams and phishing through domain registrations and more. The post Network Abuses Leveraging High-Profile Events: Suspicious Domain Registrations and Other Scams appeared first on Unit 42.
- Threat Assessment: Howling Scorpius (Akira Ransomware)by Yoav Zemah on December 2, 2024 at 11:00 pm
Howling Scorpius, active since 2023, uses Akira ransomware to target businesses globally, employing a double-extortion strategy and upgrading tools regularly. The post Threat Assessment: Howling Scorpius (Akira Ransomware) appeared first on Unit 42.
- Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 22)by Unit 42 on November 22, 2024 at 11:21 am
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include protections and mitigations. The post Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 22) appeared first on Unit 42.
- Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examplesby Maor Dokhanian on November 22, 2024 at 11:00 am
We uncover macOS lateral movement tactics, such as SSH key misuse and AppleScript exploitation. Strategies to counter this attack trend are also discussed. The post Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples appeared first on Unit 42.
- Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomwareby Unit 42 on November 20, 2024 at 11:00 am
Explore this assessment on cybercrime group Ignoble Scorpius, distributors of BlackSuit ransomware. Since May 2023, operations have increased —affecting critical sectors. The post Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomware appeared first on Unit 42.
- FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communicationsby Asher Davila and Chris Navarrete on November 19, 2024 at 11:00 am
We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicators, and also examines configurations and network communications. The post FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications appeared first on Unit 42.
- Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attackby Unit 42 on November 14, 2024 at 11:00 pm
North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities. The post Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack appeared first on Unit 42.