Detecting Popular Cobalt Strike Malleable C2 Profile TechniquesWe examine malicious Cobalt Strike case studies with distinct techniques using Malleable C2 profiles.#unit42#EN#2023#CobaltStrike#Malleable#C2#Profile#Techniques·unit42.paloaltonetworks.com·Jul 3, 2023Detecting Popular Cobalt Strike Malleable C2 Profile Techniques
Banking Trojan Techniques: Financially Motivated MalwareUnderstanding banking Trojan techniques can help detect other activities of financially motivated threat groups.#unit42#EN#2022#paloaltonetworks#research#Banking#Trojan#Techniques·unit42.paloaltonetworks.com·Nov 1, 2022Banking Trojan Techniques: Financially Motivated Malware
Credential Gathering From Third-Party SoftwareUsers often store passwords in third-party software for convenience – but credential gathering techniques can target this behavior.#unit42#EN#2022#passwords#Analysis#credential#gathering#techniques·unit42.paloaltonetworks.com·Sep 19, 2022Credential Gathering From Third-Party Software
Banking Trojan Techniques: Financially Motivated MalwareUnderstanding banking Trojan techniques can help detect other activities of financially motivated threat groups.#unit42#EN#2022#paloaltonetworks#research#Banking#Trojan#Techniques·unit42.paloaltonetworks.com·Nov 1, 2022Banking Trojan Techniques: Financially Motivated Malware
Credential Gathering From Third-Party SoftwareUsers often store passwords in third-party software for convenience – but credential gathering techniques can target this behavior.#unit42#EN#2022#passwords#Analysis#credential#gathering#techniques·unit42.paloaltonetworks.com·Sep 19, 2022Credential Gathering From Third-Party Software