Yurei: A New Ransomware ThreatResearchYurei: A New Ransomware ThreatNew Yurei ransomware shows how flawed open-source threats still cause real harm.
Building on CISA’s Salt Typhoon YARA Rules: Stairwell finds 637 New VariantsResearchBuilding on CISA’s Salt Typhoon YARA Rules: Stairwell finds 637 New VariantsStairwell expands CISA’s Salt Typhoon YARA rules, uncovering 637 new malware variants.
How to Detect NPM Package Manager Supply-Chain Attacks with YARAResearchHow to Detect NPM Package Manager Supply-Chain Attacks with YARANew npm supply-chain YARA rules out—chalk/debug + Shai-Hulud worm. Retrohunt now!
CastleBot: YARA Rule for Core BackdoorResearchCastleBot: YARA Rule for Core BackdoorDetecting CastleBot: YARA insights on TAG-150’s modular backdoor.
Are your SVGs Malicious? Hiding malware in your graphics filesResearchAre your SVGs Malicious? Hiding malware in your graphics filesSVGs are malware’s newest disguise—Stairwell spots what your filters miss.
A YARA Rule for Threat Hunting DarkCloud StealerResearchA YARA Rule for Threat Hunting DarkCloud StealerThreat hunting YARA rule for DarkCloud stealer and related malware variants.
RedDirection: A YARA Rule to Detect its ArtifactsResearchRedDirection: A YARA Rule to Detect its ArtifactsDetect RedDirection’s Chrome/Edge malware with Stairwell’s YARA rule
ToolShell: Revealing Webshell Malware Variants and a New YARA RuleResearchToolShell: Revealing Webshell Malware Variants and a New YARA RuleDetecting ToolShell webshell variants in SharePoint attacks using YARA and Hilbert curves.
Reverse Engineering Malware 101: Getting Started with macOS ReversingResearchReverse Engineering Malware 101: Getting Started with macOS ReversingGetting started with macOS malware reversing using open-source tools like Ghidra and Radare2.
Prometei Evolves: Stairwell identifies new variants and publishes 3 new YARA rulesResearchPrometei Evolves: Stairwell identifies new variants and publishes 3 new YARA rulesNew YARA rules released as Stairwell exposes 53 stealthy Prometei variants.
Detecting TodoSwiftResearchDetecting TodoSwiftDetect Swift-based macOS malware with our TodoSwift YARA rule and instant file search.
Are These 18 Malicious Browser Extensions on Your Organization’s Devices?ResearchAre These 18 Malicious Browser Extensions on Your Organization’s Devices?18 verified browser extensions were malware—Stairwell finds them on devices in seconds.
Detecting defendnot: A Tool for Silently Disabling Windows DefenderResearchDetecting defendnot: A Tool for Silently Disabling Windows DefenderStealthy tool disables Windows Defender via WSC API—Stairwell offers YARA rule for detection.
Proactive downgrade protection: Keeping your systems protected from hidden vulnerabilitiesResearchProactive downgrade protection: Keeping your systems protected from hidden vulnerabilitiesPrevent hidden threats with Stairwell’s Downdate downgrade protection system.
What You Need to Know About OpenSSH Vulnerability and New Vulnerable ScenarioResearchWhat You Need to Know About OpenSSH Vulnerability and New Vulnerable ScenarioBackground on the new OpenSSH vulnerability and how Stairwell can help