Robuta

https://blogs.jpcert.or.jp/en/2025/08/crossc2.html CrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks - JPCERT/CC Eyes | JPCERT... From September to December 2024, JPCERT/CC has confirmed incidents involving CrossC2, the extension tool to create Cobalt Strike Beacon for Linux OS. The... cobalt strikecross platform https://blogs.jpcert.or.jp/en/masubuchi/ List of “増渕 維摩(Yuma Masubuchi)” - JPCERT/CC Eyes | JPCERT Coordination Center... jpcert cclistldquoyumardquo https://blogs.jpcert.or.jp/en/2023/05/gobrat.html GobRAT malware written in Go language targeting Linux routers - JPCERT/CC Eyes | JPCERT... JPCERT/CC has confirmed attacks that infected routers in Japan with malware around February 2023. This blog article explains the details of the attack... malware writtengo language https://blogs.jpcert.or.jp/en/2023/08/yama.html YAMA-Yet Another Memory Analyzer for malware detection - JPCERT/CC Eyes | JPCERT Coordination... As attacks become more fileless and malware gets more obfuscated, it is getting more difficult to determine whether there is a malicious intent from a file by... yet anothermalware detection https://blogs.jpcert.or.jp/en/2023/09/tsubame_overflow_2023-04-06.html TSUBAME Report Overflow (Apr-Jun 2023) - JPCERT/CC Eyes | JPCERT Coordination Center official Blog This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the [Internet Threat Monitoring Quarterly... jpcert cc eyesapr juntsubame https://blogs.jpcert.or.jp/en/2025/11/APT-C-60_update.html Update on Attacks by Threat Group APT-C-60 - JPCERT/CC Eyes | JPCERT Coordination Center official... In JPCERT/CC Eyes, we previously reporte... updateattacksthreatgroupapt https://blogs.jpcert.or.jp/en/2025/02/spawnchimera.html SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability - JPCERT/CC... In January 2025, Ivanti published an adv... ivanti connect securemalware https://blogs.jpcert.or.jp/en/2024/08/smaligadget.html Dynamic Analysis Technique of Android Malware by Injecting Smali Gadgets - JPCERT/CC Eyes | JPCERT... When dynamically analyzing Android malware, it is currently difficult to follow its code using debuggers unlike Windows malware. Although there is a technique... dynamic analysistechnique