Victor Okorokov Group-IB

Victor Okorokov

Technical Head, Europe

Blog posts by Victor Okorokov

Threat Intelligence
August 17, 2022
Switching side jobs
Links between ATMZOW JS-sniffer and Hancitor
Threat Intelligence
August 5, 2021
Prometheus TDS
The key to success for Campo Loader, Hancitor, IcedID, and QBot
Threat Intelligence
May 6, 2021
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites
Group-IB specialists detected GrelosGTM group started to abuse Google Tag Manager legitimate functionality for their own purposes in infections of online shops.
Threat Intelligence
April 14, 2021
Lazarus BTC Changer
Back in action with JS sniffers redesigned to steal crypto
Threat Intelligence
March 15, 2021
JavaScript sniffers’ new tricks
Analysis of the E1RB JS sniffer family
Threat Intelligence
December 23, 2020
New attacks by UltraRank group
As part of UltraRank's new campaign, Group-IB Threat Intelligence team discovered 12 eCommerce websites infected with their JavaScript-sniffer.
Threat Intelligence
November 8, 2019
Massive malicious campaign by FakeSecurity JS-sniffer
Group-IB specialists detected a new JS-sniffer family called FakeSecurity.
Threat Intelligence
April 26, 2019
Meet the JS-Sniffers 4: CoffeMokko Family
Group-IB researchers have discovered 38 families of JS-sniffers, whereas only 12 were known previously.
Threat Intelligence
April 25, 2019
Meet the JS-Sniffers 3: Illum Family
Group-IB researchers discovered Illum JS-sniffers family designed to steal payment data of customers of online stores.
Threat Intelligence
April 19, 2019
Meet the JS-Sniffers 2: G-Analytics Family
Group-IB discovered that the stolen payment cards data is sold through an underground store specially created for this purpose.
Threat Intelligence
April 9, 2019
Meet the JS-Sniffers: ReactGet Family
ReactGet is one of the most interesting families of JS-sniffers, designed to steal banking cards data from online stores.