Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Cyber CEOs React to log4j Vulnerability
The founders of CounterCraft talk about how this generation of Docker daemon worms are working. Watch the video Read more
-
Categories: Threat Intelligence
blueheaven: Command and Control Malware
We set up deception decoys across the Internet to gather threat intel. With these decoys, we succeeded in luring this threat actor, which could be the beginning of a new malware family. It is based on a botnet that attacks servers with vulnerabilities, and their main objective is to obtain a shell where they can… Read more
-
CVE-2021-41773 Actively Exploited by H2Miner
Cloud computing has its share of major security threats, and there are some that are both consistent and insistent. One of them is the H2Miner/Kinsing malware. The people behind it use high severity, public vulnerabilities to continue installing their RAT and miner, such as the recent Apache Path Traversal CVE 2021 41773, the last vulnerability… Read more
-
Categories: Threat Intelligence
Docker Daemon Worms | Founder Chat
The founders of CounterCraft talk about how this generation of Docker daemon worms are working. Watch the video Read more
-
Defend Forward, Part Three: Taking It Operational
Make active defense operational. Read this post by Luke Wilson to find out how to put a Defend Forward strategy into practice Read more
-
Dota3 Malware Again and Again
The Dota3 Malware is still active, being injected by automated systems that are combing the internet, looking for vulnerable servers. In this blogpost, we explore the IOCs and talk about how to prevent it. Read more