DHS releases analysis of ELECTRICFISH malware

Sorry, this post has not been published yet, check again later!

May 10, 2019
Published by:

Infosecurity Magazine

“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.

Read publication

Most recent media coverage

Kaseya Victim Struggling with Decryption After REvil Goes Dark

July 16, 2021

ZDNet

Read more

Imminent Ransomware Campaign Targeting Older Appliances

July 15, 2021

Security Magazine

Read more

SonicWall Releases Urgent Security Notice About Actively Targeted EOL Devices

July 15, 2021

Tech Nadu

Read more