Guides

Contenido Guides

This study focuses on the Hive malicious code, a type of ransomware that is increasingly relevant and linked to different campaigns.

Posted on: 
Language: English
Anatsa analysis study image

This study focuses on the harmful Anatsa code, a trojan especially designed for Android devices that has been present in multiple fraudulent SMS schemes since 2020, in which logistics companies are impersonated in an attempt to get the user to install a malicious application.

Posted on: 
Language: English

This study, conducted after analysing a sample of malware from the WannaMine family, with the main purpose of identifying the actions it performs and how it spreads, as well as identifying the family it belongs to and possible destructive effects it may cause, to know it and be able to take adequate prevention and response action.

Posted on: 
Language: English

This study contains a detailed technical report prepared after analysing a sample of malicious code identified as Cring, the main purpose of which is to identify the actions it carries out, by performing an advanced analysis of the sample, using the set of tools used by the team of analysts.

Posted on: 
Language: English

This study focuses on the malicious code FluBot, a Trojan specially designed for Android devices and which has been present in multiple fraudulent SMS campaigns since 2020, in which it spoofs logistics companies seeking to have the user install a malicious application.

Posted on: 
Language: English

Through this study, a detail technical analysis of the threat is undertaken, with a sample of the malicious code, which belongs to the Mekotio family, with the main aim of identifying the actions this software carries out, using the set of tools used by this team of analysts.

Posted on: 
Language: English

This document provides Information Security Officers (ISOs) with guidelines for complying with the obligation to report cybersecurity incidents that have taken place within Public Administrations, critical infrastructures and strategic operators under their purview, as well as the rest of the entities included in the scope of application of Spanish Royal Decree-Law 12/2018.

Posted on: 
Language: English

This guide sets out the steps necessary and main recommendations for conducting an asset inventory in industrial networks. To do this, various possible methods are addressed, and their different characteristics are reviewed.

Posted on: 
Language: English

This guide includes concepts related to honeypots, recommended requisites for their correct implementation, different possible types and their evolution to the present day, where they are implemented, forming a honeynet.

Posted on: 
Language: English

The Cyber-resilience Improvement Indicators (CII) model is a tool to diagnose and measure the capacity of organizations to resist and overcome disasters and disturbances from the digital environment.

Posted on: 
Language: English