From the Labs

From the Labs ReversingLabs

ReversingLabs threat analysts work tirelessly to respond to threats and provide customers with information and tools to defend their systems from attacks. Our open source YARA rules help threat hunters, incident responders and security analysts detect malicious behavior.

These posts highlight some of the most important free YARA rules from the ReversingLabs threat research team. To put them into action, see our dedicated page on GitHub:

• ReversingLabs YARA Rules GitHub page


November 14, 2022

From the Labs: YARA Rule for Detecting GwisinLocker

ReversingLabs’ YARA detection rule for GwisinLocker can help you find this ransomware in your environment. 
November 3, 2022

From the Labs: YARA Rule for Detecting LockBit

ReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here. 
September 26, 2022

From the Labs: YARA Rule for Detecting Nokoyawa

ReversingLabs’ YARA detection rule for Nokoyawa can help you find this ransomware in your environment. 
September 14, 2022

From the Labs: YARA Rule for Detecting GoodWill

ReversingLabs’ YARA detection rule for GoodWill can help you find this ransomware in your environment. 
September 7, 2022

From the Labs: YARA Rule for Detecting Blue Locker

ReversingLabs's YARA rules tool detects the Blue Locker ransomware family, a ransomware threat currently circulating in the wild.
September 6, 2022

From the Labs: YARA Rule for Detecting Acepy

ReversingLabs' YARA rule tool can detect the Acepy ransomware — a new ransomware variant that was first identified in March, 2022.

Subscribe

Sign up to receive our weekly newsletter, which will contain updates to From the Labs.

Get Started
Request a DEMO

Request a live demo today for a walkthrough of how ReversingLabs detects and analyzes more hidden threats, built to evade security controls—and how we do it faster than anyone else.

REQUEST A DEMO