As we bid farewell to 2023, let us highlight some enlightening insights. The research conducted by Corvus Insurance has shown a significant increase of over 95% in ransomware attacks compared to the previous year. According to Statista, over 72% of businesses worldwide were affected by ransomware attacks during 2023. Education, local and state government, healthcare, […]
https://www.hackcraft.gr/wp-content/uploads/2024/02/hcvsransom.jpg6961200Villy Varsouhttps://www.hackcraft.gr/wp-content/uploads/2023/03/logo.pngVilly Varsou2024-02-23 09:09:482024-02-28 15:59:35Defending Against the Surge: Red Teaming in the Wake of Ransomware Attacks in Europe and Greece
Wherever there's Windows in corporate environments, there are Windows File (SMB) Shares. More often than not, during Adversary Simulation exercises operators need to enumerate which shares exist on which hosts, who can read and/or write to them, what files they contain, etc. Scenarios often arise that may even involve enumerating shares to write to them, […]
This is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to provide a small but concise use case, demonstrating the effectiveness of templating in malware development and how you can port your own "traditional" malware to templated ones, leveraging the sinister […]
https://www.hackcraft.gr/wp-content/uploads/2023/06/040621_sg_subtraction_feat-1030x580-1.jpg5801030Nick Aliferopouloshttps://www.hackcraft.gr/wp-content/uploads/2023/03/logo.pngNick Aliferopoulos2023-06-19 09:01:242023-06-20 08:50:25From traditional to templated malware
Defending Against the Surge: Red Teaming in the Wake of Ransomware Attacks in Europe and Greece
/in Newsletter/by Villy VarsouAs we bid farewell to 2023, let us highlight some enlightening insights. The research conducted by Corvus Insurance has shown a significant increase of over 95% in ransomware attacks compared to the previous year. According to Statista, over 72% of businesses worldwide were affected by ransomware attacks during 2023. Education, local and state government, healthcare, […]
Treading carefully in Share Enumeration
/in Cyber Security, Tools/by Nick AliferopoulosWherever there's Windows in corporate environments, there are Windows File (SMB) Shares. More often than not, during Adversary Simulation exercises operators need to enumerate which shares exist on which hosts, who can read and/or write to them, what files they contain, etc. Scenarios often arise that may even involve enumerating shares to write to them, […]
From traditional to templated malware
/in Cyber Security, Tools/by Nick AliferopoulosThis is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to provide a small but concise use case, demonstrating the effectiveness of templating in malware development and how you can port your own "traditional" malware to templated ones, leveraging the sinister […]