https://blogs.jpcert.or.jp/en/2025/08/crossc2.html
CrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks - JPCERT/CC Eyes | JPCERT...
From September to December 2024, JPCERT/CC has confirmed incidents involving CrossC2, the extension tool to create Cobalt Strike Beacon for Linux OS. The...
cobalt strikecross platform
https://blogs.jpcert.or.jp/en/masubuchi/
List of “増渕 維摩(Yuma Masubuchi)” - JPCERT/CC Eyes | JPCERT Coordination Center...
jpcert cclistldquoyumardquo
https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
GobRAT malware written in Go language targeting Linux routers - JPCERT/CC Eyes | JPCERT...
JPCERT/CC has confirmed attacks that infected routers in Japan with malware around February 2023. This blog article explains the details of the attack...
malware writtengo language
https://blogs.jpcert.or.jp/en/2023/08/yama.html
YAMA-Yet Another Memory Analyzer for malware detection - JPCERT/CC Eyes | JPCERT Coordination...
As attacks become more fileless and malware gets more obfuscated, it is getting more difficult to determine whether there is a malicious intent from a file by...
yet anothermalware detection
https://blogs.jpcert.or.jp/en/2023/09/tsubame_overflow_2023-04-06.html
TSUBAME Report Overflow (Apr-Jun 2023) - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the [Internet Threat Monitoring Quarterly...
jpcert cc eyesapr juntsubame
https://blogs.jpcert.or.jp/en/2025/11/APT-C-60_update.html
Update on Attacks by Threat Group APT-C-60 - JPCERT/CC Eyes | JPCERT Coordination Center official...
In JPCERT/CC Eyes, we previously reporte...
updateattacksthreatgroupapt
https://blogs.jpcert.or.jp/en/2025/02/spawnchimera.html
SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability - JPCERT/CC...
In January 2025, Ivanti published an adv...
ivanti connect securemalware
https://blogs.jpcert.or.jp/en/2024/08/smaligadget.html
Dynamic Analysis Technique of Android Malware by Injecting Smali Gadgets - JPCERT/CC Eyes | JPCERT...
When dynamically analyzing Android malware, it is currently difficult to follow its code using debuggers unlike Windows malware. Although there is a technique...
dynamic analysistechnique