PinnedS2WinS2W BLOGKimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer…Author: Jiho Kim & Sebin Lee | BLKSMTHFeb 8Feb 8
S2WinS2W BLOGThreat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt ScriptAuthor: Jiho Kim | S2W TALONAug 22Aug 22
S2WinS2W BLOGTellYouThePass: Ransomware Attacks Exploits Critical PHP RCE VulnerabilityAuthor: S2W TALONAug 1Aug 1
S2WinS2W BLOG[FIRSTCON 2024] Dissecting the Arsenals of LockBitAuthor: Huiseong Yang | S2W TALONJun 13Jun 13
S2WinS2W BLOGTrends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…Author: HOTSAUCE (Threat Detection Team) | S2W TALONJun 7Jun 7
S2WinS2W BLOGDeep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)Author: S2W TALONApr 30Apr 30
S2WinS2W BLOGSecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1)Author: S2W TALONApr 30Apr 30
S2WinS2W BLOGStory of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English…Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English ver.)Apr 18Apr 18
S2WinS2W BLOGThe XZ Backdoor issue triggered by one untrusted maintainerAuthor: Minyeop Choi, Hosu Choi, Sojun Ryu | S2W TALONApr 16Apr 16
S2WinS2W BLOGRansomware Resurgence: A Deep Dive into 2023’s Threatscape and Risk AssessmentAuthor: Kyunghee Kim, Jiho Kim and Huiseong Yang | S2W TALONApr 9Apr 9