Skip main navigation

Juniper Threat Labs

Juniper Threat Labs is a threat intelligence portal that features rapid and actionable insights from world-class security researchers.

In the Wild

Podcasts

BlackByte Ransomware Attacks Critical Infrastructure, February 26, 2022 | Episode 36

Apache Log4j RCE Vulnerability, December 15, 2021 | Episode 35

Zoho Vulnerabilities DarkSide Ransomware and MageCart-Style Skimmers, December 9, 2021 | Episode 34

Curbing Ransomware Trends: The Role of Network Posture, Technology, Politics and Regulation, November 23, 2021 | Episode 33

BlackMatter Ransomware as a Service, BlackByte Ransomware and Sinclair Attack, October 20, 2021 | Episode 32

OMIGOD and Netgear vulnerabilities, September 22, 2021 | Episode 31

Aggah using ZenDesk, Confluence and ManageEngine vulnerabilities. September 15, 2021 | Episode 30

TCP Reflective DDoS Attacks, August 22, 2021 | Episode 29

Kaseya Service Chain Attack, July 9 | Episode No. 28

Preventing Another Colonial Pipeline Ransomware Attack, June 17 | Episode No. 27

Linux SSH Backdoors, May 11 | Episode No. 26

PHP Repo Compromise, April 15 | Episode No. 25

Ransomware Resurgence, April 5 | Episode No. 24

MS Exchange ProxyLogon vulnerability CVE-2021-26855, March 23 | Episode No. 23

Dependency Confusion Attack, February 19 | Episode No. 22

Emotet Takedown, February 3 | Episode No. 21

Sunburst Attacks - Why Was the Stealth So Effective?, January 8, 2021 | Episode No. 20

SolarWinds Orion Compromise, December 22 | Episode No. 19

Gitpaste-12: What You Need to Know, November 25 | Episode No. 18

Threat Intelligence & Threat Research: Better Together, November 9 | Episode No. 17

Priority Botnet, Pastebin-like Malware Campaigns, Emotet Resurgence, October 13 | Episode No.16

Microsoft Zerologon CVE-2020-1472, DoppelPaymer Ransomware, IoT Security, October 1, 2020 | Episode No. 15

Zeppelin ransomware, CVE-2020-16875, CVE-2020-1210 and 2FA phishing attacks, September 15, 2020 | Episode No. 14

IcedID, Shellshock and More, September 10, 2020 | Episode No. 13

Black Hat, DEFCON, Supply Chain Attacks and More, August 12, 2020, Episode No. 12

Twitter Hack, Meow Attacks, and More, July 24, 2020, Episode No. 11

Conti Ransomware, Phishing Attacks and More, July 14, 2020, Episode No 10.

Botnet Malware Targeting Docker Servers, Browser Extension Malware, June 29, 2020 Episode No. 9

Ransomware Attacks, Municipal Governments and More, June 17, 2020 Episode No. 8

Pegasus, Juicy Potato and Cryptomining, June 9, 2020 Episode No. 7

Tips for Safe Distributed Working, May 20, 2020 Episode No. 6

Fallout of Pulse CVE-2019-11510, Microsoft Patch Tuesday CVE-2020-1027, CVE-2020-1020 and CVE-2020-0938, April 17, 2020 Episode No. 5

Working remote, Zoombombing, April 4, 2020 Episode No. 4

Necurs Botnet Takedown, March 20, 2020 Episode No. 3

Apache GhostRat CVE-2020-1938, Chrome and Exchange 0-days, Ransomware exfil, March 10, 2020 Episode No. 2

MS CryptoAPI CVE-2020-0601, MS IE CVE-2020-0674, Citrix ADC 2019-19781, February 5, 2020 Episode No. 1

Featured Content

Notes

Watch this video to learn how the Juniper SRX Series Firewall can identify BlueSky Ransomware and isolate an infected host in a ransomware attack.

Notes

Watch this video to learn how the Juniper SRX Series Firewall can identify Lockbit 3.0 Ransomware and isolate an infected host in a ransomware attack.

Notes

Dr. Mounir Hahad joins Ted Harrington of ITSPmagazine to discuss threat intelligence - what it is, why it matters, and why it's important to share information.

Notes

Dr. Mounir Hahad joins Daniel Newman, Principal Analyst at Futurum Tech to discuss the current state of our threat landscape.

Notes

Mounir Hahad, head of Juniper Threat Labs, discusses the challenges enterprises face with a hybrid work environment and how to improve security posture.

Notes

Mounir Hahad, head of Juniper Threat Labs, discusses Juniper's ability to analyze encrypted traffic in this interview with ITSP Magazine.

Notes

When it comes to online shopping, vendors need to be aware of the security risks posed by supply chain attacks. Mounir Hahad, Head of Juniper Threat Labs, some useful tools and tips.

Malware Knowledge Base

Blackbyte Ransomware

Blackbyte has been known to be a Ransomware-as-a-Service (RaaS) since July 2021. It was reported that it was used in infecting organizations in at least three US critical infrastructure sectors.

Hermetic Wiper

HermeticWiper was found deployed in some Ukrainian organizations a day before the Russian invasion on February 24, 2022. The malware was compiled on December 28, 2021 as seen on its file properties.

“Springshell” Vulnerability

On March 30, a pseudonymous security researcher posted a proof of concept of a remote code execution vulnerability in the Spring framework for Java. Early speculation likened this vulnerability to last year’s log4shell vulnerability.

AgentTesla

Agent Tesla is a spyware that is able to steal personal data from web browsers, mail clients and FTP servers. It can also collect screenshots, videos, clipboard data as well as personal data from VPN clients.

In the News
By: Becky Bracken, Threat Post, October 13, 2021
By: Ravie Lakshmanan, The Hacker News, December 15, 2020
By: Phil Muncaster, Infosecurity Magazine, December 15, 2020
By: Steve Zurier, SC Magazine, December 14, 2020
By: Staff, Payments NEXT, December 10, 2020
By: Mounir Hahad, Cyber Defense Magazine, December 3, 2020
By: Prajeet Nair, BankInfo Security, December 2, 2020
By: Ionut Arghire, SecurityWeek, December 2, 2020