ReversingLabs threat analysts work tirelessly to respond to threats and provide customers with information and tools to defend their systems from attacks. Our open source YARA rules help threat hunters, incident responders and security analysts detect malicious behavior.
These posts highlight some of the most important free YARA rules from the ReversingLabs threat research team. To put them into action, see our dedicated page on GitHub:
• ReversingLabs YARA Rules GitHub page
December 20, 2023
In this edition of From the Labs, a series explaining the threats behind ReversingLabs' YARA rules, we break down BiBi Wiper, a wiper malware.
July 21, 2023
In this edition, we take a look at what Minodo is, where it came from, and how cybercriminals are using it to deliver other malware families.
July 7, 2023
In this edition of From the Labs, we contextualize StealC, a popular malware infostealer that has become a favored tool for cybercriminals.
June 16, 2023
The ReversingLabs YARA detection rule for HermeticRansom can help you find this ransomware in your environment.
May 12, 2023
ReversingLabs researchers created detection YARA rules for a debugger evasion recently added to the Malware Behavior Catalog as Exception Flooding.
March 24, 2023
ReversingLabs YARA detection rule for NB65 can help you find this ransomware in your environment.
February 17, 2023
ReversingLabs YARA detection rule for Lorenz can help you find this ransomware in your environment. Learn more about the Lorenz ransomware gang now.
January 20, 2023
ReversingLabs’ YARA detection rule for Black Basta can help you find this ransomware in your environment.
November 14, 2022
ReversingLabs’ YARA detection rule for GwisinLocker can help you find this ransomware in your environment.
November 3, 2022
ReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here.