From the Labs
From the Labs ReversingLabs

ReversingLabs threat analysts work tirelessly to respond to threats and provide customers with information and tools to defend their systems from attacks. Our open source YARA rules help threat hunters, incident responders and security analysts detect malicious behavior.

These posts highlight some of the most important free YARA rules from the ReversingLabs threat research team. To put them into action, see our dedicated page on GitHub:

• ReversingLabs YARA Rules GitHub page


September 26, 2022

From the Labs: YARA Rule for Detecting Nokoyawa

ReversingLabs’ YARA detection rule for Nokoyawa can help you find this ransomware in your environment. 
September 14, 2022

From the Labs: YARA Rule for Detecting GoodWill

ReversingLabs’ YARA detection rule for GoodWill can help you find this ransomware in your environment. 
September 7, 2022

From the Labs: YARA Rule for Detecting Blue Locker

ReversingLabs's YARA rules tool detects the Blue Locker ransomware family, a ransomware threat currently circulating in the wild.
September 6, 2022

From the Labs: YARA Rule for Detecting Acepy

ReversingLabs' YARA rule tool can detect the Acepy ransomware — a new ransomware variant that was first identified in March, 2022.
May 13, 2022

From the Labs: YARA Rule for Detecting Conti

ReversingLabs provides tools to detect the CONTI ransomware family - a leading ransomware as a service outfit
May 13, 2022

From the Labs: YARA Rule for Detecting Malware Wipers

ReversingLabs has released three new YARA rules to detect HermeticWiper, IsaacWiper, and CaddyWiper

Subscribe

Sign up to receive our weekly newsletter, which will contain updates to From the Labs.

Get Started
Request a DEMO

Request a live demo today for a walkthrough of how ReversingLabs detects and analyzes more hidden threats, built to evade security controls—and how we do it faster than anyone else.

REQUEST A DEMO