unit42.paloaltonetworks.com Open in urlscan Pro
92.123.151.6  Public Scan

URL: https://unit42.paloaltonetworks.com/
Submission: On December 22 via api from BY — Scanned from ES

Form analysis 1 forms found in the DOM

Name: Unit42_SubscribePOST https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json

<form action="https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json" method="post" novalidate="" class="subscribe-form" name="Unit42_Subscribe" id="unit42footerSubscription_form">
  <input type="hidden" name="emailFormMask" value="">
  <input type="hidden" value="1086" name="formid">
  <input type="hidden" value="531-OCS-018" name="munchkinId">
  <input type="hidden" value="2141" name="lpId">
  <input type="hidden" value="1203" name="programId">
  <input type="hidden" value="1086" name="formVid">
  <input type="hidden" name="mkto_optinunit42" value="true">
  <input type="hidden" name="mkto_opt-in" value="true">
  <div class="form-group">
    <label for="newsletter-email" id="newsletter-email-label">Your Email</label>
    <input type="emal" placeholder="Your Email" name="Email" class="subscribe-field" id="newsletter-email" aria-labelledby="newsletter-email-label">
    <p class="error-mail mb-15 text-danger" style="color: #dc3545"></p>
    <p>Subscribe for email updates to all Unit 42 threat research.<br>By submitting this form, you agree to our
      <a title="Terms of Use" href="https://www.paloaltonetworks.com/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="Get updates from Unit 42:Terms of Use">Terms of Use</a> and acknowledge our
      <a title="Privacy Statement" href="https://www.paloaltonetworks.com/legal-notices/privacy" data-page-track="true" data-page-track-value="Get updates from Unit 42:Privacy Statement">Privacy Statement.</a></p>
    <div class="g-recaptcha" data-expired-callback="captchaExpires" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
    <p class="error-recaptcha d-none mt-15 text-danger" style="color: #dc3545">Invalid captcha!</p>
    <button class="l-btn is-disabled" data-page-track="true" data-page-track-value="footer:Get updates from Unit 42:Subscribe" id="unit42footerSubscription_form_button"> Subscribe <img class="lozad"
        data-src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/right-arrow.svg" alt="Right Arrow">
      <img src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/icon-loader.svg" alt="loader" class="loader">
    </button>
    <div class="form-success-message"></div>
  </div>
</form>

Text Content

Menu
 * Tools
 * ATOMs
 * Security Consulting
 * About Us
 * Under Attack?

 * 
 * About Unit 42
 * Services
   Services
   Assess and Test Your Security Controls
    * AI Security Assessment
    * Attack Surface Assessment
    * Breach Readiness Review
    * BEC Readiness Assessment
    * Cloud Security Assessment
    * Compromise Assessment
    * Cyber Risk Assessment
    * M&A Cyber Due Diligence
    * Penetration Testing
    * Purple Team Exercises
    * Ransomware Readiness Assessment
    * SOC Assessment
    * Supply Chain Risk Assessment
    * Tabletop Exercises
    * Unit 42 Retainer
   
   Transform Your Security Strategy
    * IR Plan Development and Review
    * Security Program Design
    * Virtual CISO
    * Zero Trust Advisory
   
   Respond in Record Time
    * Cloud Incident Response
    * Digital Forensics
    * Incident Response
    * Managed Detection and Response
    * Managed Threat Hunting
    * Unit 42 Retainer
   
   UNIT 42 RETAINER
   
   Custom-built to fit your organization's needs, you can choose to allocate
   your retainer hours to any of our offerings, including proactive cyber risk
   management services. Learn how you can put the world-class Unit 42 Incident
   Response team on speed dial.
   
   Learn more
 * Unit 42 Threat Research
   Unit 42 Threat Research
   Unit 42 Threat Research
    * Threat Briefs and Assessments
      Details on the latest cyber threats
    * Tools
      Lists of public tools released by our team
    * Threat Reports
      Downloadable, in-depth research reports
   
   THREAT REPORT
   
   2024 Unit 42 Incident Response Report
   
   Read now
   THREAT BRIEF
   
   Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats
   Including DDoS, HermeticWiper, Gamaredon, Website Defacement
   
   Learn more
   THREAT REPORT
   
   Highlights from the Unit 42 Cloud Threat Report, Volume 6
   
   Learn more
 * Partners
   Partners
   Partners
    * Threat Intelligence Sharing
    * Law Firms and Insurance Providers
   
   THREAT REPORT
   
   2022 Unit 42 Ransomware Threat Report: Understand trends and tactics to
   bolster defenses
   
   Learn more
   THREAT BRIEF
   
   Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats
   Including DDoS, HermeticWiper, Gamaredon, Website Defacement
   
   Learn more
   THREAT BRIEF
   
   Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email
   Compromise Ring Members
   
   Learn more
 * Resources
   Resources
   Resources
    * Research Reports
    * Webinars
    * Customer Stories
    * Datasheets
    * Videos
    * Infographics
    * Whitepapers
    * Cyberpedia
   
   Industries
    * Financial Services
    * Healthcare
    * Manufacturing
   
   ANALYST REPORT
   
   Unit 42® has been named a Leader in “The Forrester Wave™: Cybersecurity
   Incident Response Services, Q2 2024.” Read the Forrester report to learn why.
   
   Get the report
   THREAT REPORT
   
   Unit 42 Threat Frontier Report: Discover the latest insights on how threat
   actors are leveraging GenAI to exploit vulnerabilities — and learn what steps
   you can take to protect yourself.
   
   Get the report

 * 
 * Under Attack?




Search
All
 * Tech Docs


Close search modal

CRITICAL THREAT
Threat Research December 20, 2024


NOW YOU SEE ME, NOW YOU DON’T: USING LLMS TO OBFUSCATE MALICIOUS JAVASCRIPT

This article demonstrates how AI can be used to modify and help detect
JavaScript malware. We boosted our detection rates 10% with retraining.

Algorithm Overview and More
Threat Research December 20, 2024


NOW YOU SEE ME, NOW YOU DON’T: USING LLMS TO OBFUSCATE MALICIOUS JAVASCRIPT

Threat Research December 18, 2024


EFFECTIVE PHISHING CAMPAIGN TARGETING EUROPEAN COMPANIES AND ORGANIZATIONS

Threat Research December 17, 2024


LDAP ENUMERATION: UNVEILING THE DOUBLE-EDGED SWORD OF ACTIVE DIRECTORY


Threat Research
 * Threat Research
 * High Profile Threats
 * Learning Hub
 * Threat Actor Groups
 * Trend Reports


ACCESS THE LATEST THREAT RESEARCH

View all research
Cloud Cybersecurity Research December 16, 2024

DIRTY DAG: NEW VULNERABILITIES IN AZURE DATA FACTORY’S APACHE AIRFLOW
INTEGRATION

 * Microsoft Azure
 * Container

Read now
Malware December 13, 2024

CRYPTED HEARTS: EXPOSING THE HEARTCRYPT PACKER-AS-A-SERVICE OPERATION

 * Redline infostealer
 * Lumma Stealer
 * Remcos

Read now
Malware December 6, 2024

NETWORK ABUSES LEVERAGING HIGH-PROFILE EVENTS: SUSPICIOUS DOMAIN REGISTRATIONS
AND OTHER SCAMS

 * Network scanning
 * Cybersquatting
 * ChatGPT

Read now


UNDERSTAND HIGH PROFILE CYBERTHREATS AND VULNERABILITIES

View high profile threats
High Profile Threats November 22, 2024

THREAT BRIEF: OPERATION LUNAR PEEK, ACTIVITY RELATED TO CVE-2024-0012 AND
CVE-2024-9474 (UPDATED NOV. 22)

We detail the observed limited activity regarding authentication bypass
vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and
include protections and mitigations.

Read now
Ransomware December 2, 2024

THREAT ASSESSMENT: HOWLING SCORPIUS (AKIRA RANSOMWARE)

 * Howling Scorpius
 * Leak site
 * Torrenting

Read now
Vulnerabilities November 22, 2024

THREAT BRIEF: OPERATION LUNAR PEEK, ACTIVITY RELATED TO CVE-2024-0012 AND
CVE-2024-9474 (UPDATED NOV. 22)

 * PAN-OS

Read now
Ransomware November 20, 2024

THREAT ASSESSMENT: IGNOBLE SCORPIUS, DISTRIBUTORS OF BLACKSUIT RANSOMWARE

 * BlackSuit ransomware
 * Construction
 * Education

Read now
Ransomware October 10, 2024

LYNX RANSOMWARE: A REBRANDING OF INC RANSOMWARE

 * Leak site
 * Double extortion

Read now
Ransomware September 10, 2024

THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE

 * RaaS
 * Data exfiltration
 * Leak site

Read now
Malware September 9, 2024

THREAT ASSESSMENT: NORTH KOREAN THREAT GROUPS

 * North Korea
 * Remote Access Trojan
 * Finance

Read now


WATCH, LISTEN AND LEARN ABOUT CYBERSECURITY TOPICS

View All
Previous
Malware February 2, 2024

EXPLORING THE
LATEST MISPADU STEALER VARIANT

Learn more
Vulnerabilities January 1, 2024

THREAT VECTOR
PODCAST

Learn more
Cybersecurity Tutorials October 10, 2023

WIRESHARK TUTORIAL:
IDENTIFYING HOSTS AND USERS

Learn more
Cybersecurity Tutorials September 8, 2023

WIRESHARK TUTORIAL:
DISPLAY FILTER EXPRESSIONS

Learn more
Cybersecurity Tutorials March 1, 2024

WIRESHARK TUTORIAL:
EXPORTING OBJECTS FROM A PCAP

Learn more
Malware February 2, 2024

EXPLORING THE
LATEST MISPADU STEALER VARIANT

Learn more
Vulnerabilities January 1, 2024

THREAT VECTOR
PODCAST

Learn more
Cybersecurity Tutorials October 10, 2023

WIRESHARK TUTORIAL:
IDENTIFYING HOSTS AND USERS

Learn more
Cybersecurity Tutorials September 8, 2023

WIRESHARK TUTORIAL:
DISPLAY FILTER EXPRESSIONS

Learn more
Cybersecurity Tutorials March 1, 2024

WIRESHARK TUTORIAL:
EXPORTING OBJECTS FROM A PCAP

Learn more
Malware February 2, 2024

EXPLORING THE
LATEST MISPADU STEALER VARIANT

Learn more
Vulnerabilities January 1, 2024

THREAT VECTOR
PODCAST

Learn more
Cybersecurity Tutorials October 10, 2023

WIRESHARK TUTORIAL:
IDENTIFYING HOSTS AND USERS

Learn more
Cybersecurity Tutorials September 8, 2023

WIRESHARK TUTORIAL:
DISPLAY FILTER EXPRESSIONS

Learn more
Next
 * 1
 * 2
 * 3
 * 4
 * 5


FOLLOW THE ACTIVITIES OF THREAT ACTOR GROUPS TRACKED BY UNIT 42

All threat actor posts
Cybercrime June 27, 2024

THREAT ACTOR GROUPS TRACKED BY PALO ALTO NETWORKS UNIT 42

A comprehensive list of threat actor groups tracked by Unit 42, along with
information such as summaries and industries typically impacted.

Read now
Ransomware November 20, 2024

THREAT ASSESSMENT: IGNOBLE SCORPIUS, DISTRIBUTORS OF BLACKSUIT RANSOMWARE

 * BlackSuit ransomware
 * Construction
 * Education

Read now
Business Email Compromise November 14, 2024

FAKE NORTH KOREAN IT WORKER LINKED TO BEAVERTAIL VIDEO CONFERENCE APP PHISHING
ATTACK

 * North Korea
 * Lazarus
 * BeaverTail

Read now
Cybercrime November 7, 2024

SILENT SKIMMER GETS LOUD (AGAIN)

 * Remote Code Execution
 * Python
 * Reverse shells

Read now
Ransomware October 30, 2024

JUMPY PISCES ENGAGES IN PLAY RANSOMWARE

 * North Korea
 * Jumpy Pisces
 * Fiddling Scorpius

Read now
Malware October 9, 2024

CONTAGIOUS INTERVIEW: DPRK THREAT ACTORS LURE TECH INDUSTRY JOB SEEKERS TO
INSTALL NEW VARIANTS OF BEAVERTAIL AND INVISIBLEFERRET MALWARE

 * North Korea
 * Social engineering
 * Python

Read now
Malware September 26, 2024

UNRAVELING SPARKLING PISCES’S TOOL SET: KLOGEXE AND FPSPY

 * MITRE
 * Keylogger
 * North Korea

Read now


EXPLORE IN-DEPTH CYBERSECURITY TREND REPORTS

View All
Report

THE UNIT 42 THREAT FRONTIER: PREPARE FOR EMERGING AI RISKS

Strengthen your grasp of generative AI (GenAI) and learn how attackers can go
about compromising GenAI tools to support their efforts.

Identify critical capabilities

 * Learn why conventional cybersecurity tactics are still relevant when
   defending against AI-enabled attackers.

Real examples

 * We describe how Unit 42 red teams are using AI in our proactive security
   engagements.

Extend your current understanding to the likely future and keep up with, or
perhaps even outpace, attackers using AI.

 

Get the report

Security Technology October 16, 2024

UNIT 42 LOOKS TOWARD THE THREAT FRONTIER: PREPARING FOR EMERGING AI RISKS

 * GenAI

Read now
Security Technology August 14, 2024

UNIT 42 ATTACK SURFACE THREAT RESEARCH: OVER 23% OF INTERNET-CONNECTED EXPOSURES
INVOLVE CRITICAL IT AND SECURITY INFRASTRUCTURE

 * Attack analysis
 * Media
 * Attack surface management

Read now
Ransomware August 9, 2024

RANSOMWARE REVIEW: FIRST HALF OF 2024

 * Healthcare
 * LockBit
 * RansomHub

Read now
Cloud Cybersecurity Research June 18, 2024

ATTACK PATHS INTO VMS IN THE CLOUD

 * AWS
 * IaaS
 * Virtual machines

Read now

FOLLOW UNIT 42 FOR BREAKING THREAT INTELLIGENCE

 * 
 * 
 * 
 * 

Get updates from Unit 42


PEACE OF MIND COMES FROM STAYING AHEAD OF THREATS. CONTACT US TODAY.

Your Email



Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our
Privacy Statement.



Invalid captcha!

Subscribe



PRODUCTS AND SERVICES

 * Network Security Platform
 * CLOUD DELIVERED SECURITY SERVICES
 * Advanced Threat Prevention
 * DNS Security
 * Data Loss Prevention
 * IoT Security

 * Next-Generation Firewalls
 * Hardware Firewalls
 * Strata Cloud Manager

 * SECURE ACCESS SERVICE EDGE
 * Prisma Access
 * Prisma SD-WAN
 * Autonomous Digital Experience Management
 * Cloud Access Security Broker
 * Zero Trust Network Access

 * Code to Cloud Platform
 * Prisma Cloud
 * Cloud-Native Application Protection Platform

 * AI-Driven Security Operations Platform
 * Cortex XDR
 * Cortex XSOAR
 * Cortex Xpanse
 * Cortex XSIAM
 * External Attack Surface Protection
 * Security Automation
 * Threat Prevention, Detection & Response

 * Threat Intel and Incident Response Services
 * Proactive Assessments
 * Incident Response
 * Transform Your Security Strategy
 * Discover Threat Intelligence


COMPANY

 * About Us
 * Careers
 * Contact Us
 * Corporate Responsibility
 * Customers
 * Investor Relations
 * Location
 * Newsroom


POPULAR LINKS

 * Blog
 * Communities
 * Content Library
 * Cyberpedia
 * Event Center
 * Manage Email Preferences
 * Products A-Z
 * Product Certifications
 * Report a Vulnerability
 * Sitemap
 * Tech Docs
 * Unit 42
 * Do Not Sell or Share My Personal Information

 * Privacy
 * Trust Center
 * Terms of Use
 * Documents


Copyright © 2024 Palo Alto Networks. All Rights Reserved
 * 
 * 
 * 
 * 
 * 

EN
 * Select your language
 * USA (ENGLISH)
 * JAPAN (日本語)


Your browser does not support the video tag.


DEFAULT HEADING

Read the article
Seekbar



Volume
This site uses cookies essential to its operation, for analytics, and for
personalized content and ads. Please read our privacy statement for more
information.Privacy statement
Cookies Settings Reject All Accept All


Your Opt Out Preference Signal is Honored


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information on cookie consent
Allow All


MANAGE YOUR CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices