"Are You at Risk? OneNote Attachments in Phishing Emails" - Understanding a New Threat Vector
This blog post explores a new threat vector in phishing emails that use OneNote attachments to deliver malware. The post provides a detailed analysis of a sample email, attachment, and associated files, as well as identifying patterns and themes identified in the wild. The post also explains how the attack chain works and provides additional subject themes observed.
What’s Your Analysis Process Pt. 2
In my last post, I introduced a list of considerations to keep in mind when trying to dial in a workflow for malware analysis. Now it's my turn to start breaking down how I approach these considerations. Read on to learn more about creating a malware analysis workflow.
What’s Your Analysis Process Pt. 1
New Analysts Often Find It Challenging to Establish Consistent Workflows or Processes for Their Analysis
I'm certain that beginning from any foundation, no matter how developed, will give you an advantage when facing future challenges. This is especially beneficial for new analysts looking to establish consistent workflows for their analysis.