A Behind the Scenes Look into Investigating Conti LeaksAuthor Note: I originally published this information on 21 March 2022 when I wrote it for my employer, Anayst1. At the time, I wanted to…Apr 4, 2023Apr 4, 2023
Iran CNE: Unmasking State Sponsored Hacking (2014)Author Note: I originally published this and several other blogs between 2013–2014 on my website, which I took down several years later. I…Oct 5, 2022Oct 5, 2022
Parastoo: Iran Based Cyber Threat Continues to Mislead Media ChannelsAuthor Note: I originally published this and several other blogs between 2013–2014 on my website, which I took down several years later. I…Oct 5, 2022Oct 5, 2022
Risk Behaviors and Insider Threat: Cyber Espionage Use-caseAuthor Note: I originally published this and several other blogs between 2013–2014 on my website, which I took down several years later. I…Oct 4, 2022Oct 4, 2022
Hacking HealthcareAuthor Note: I originally published this and several other blogs between 2013–2014 on my website, which I took down several years later. I…Oct 4, 20221Oct 4, 20221
Published inuseanalyst1Lies from the DarkSide: Ransomware Gang Lied About Pipeline AttackIn May 2021, DarkSide, a Russian criminal gang, hacked Colonial Pipeline, the organization responsible for the largest Gas pipeline…May 14, 2021May 14, 2021
Published inuseanalyst1Ransomware Gangs Move Toward Efficient Self-Automated AttacksIn early April 2021, Analyst1 published a whitepaper analyzing a self-proclaimed ransom cartel. While conducting research for the…May 4, 2021May 4, 2021
Published inThreat IntelOperation Bachosens: A detailed look into a long-running cyber crime campaignAn insight into an investigation into a unique attack on an automotive parts supplier in China that ended with unexpected results.May 31, 2017May 31, 2017