Blog & Insights

Stay informed with the latest insights, trends, and best practices in cybersecurity.

Detecting Covert Exfiltration Through Kernel Signature Analysis: A Dual-Stream Network Research Lab

Executive Summary In the ever-evolving landscape of cybersecurity, adversaries continuously refine their techniques to evade detection. One of the most challenging threats to detect is low-and-slow data exfiltration – attacks that deliberately mimic legitimate traffic patterns to avoid triggering security controls. This blog post presents a research methodology for distinguishing between legitimate TCP streams and […]

Project MSFDefender

The Threat Research & Intelligence (TRI) team at Bloo conducted a structured evaluation of Windows payloads from the Metasploit Framework. The intent was not exploitation for its own sake, but defensive research to observe how these payloads behave at runtime and to collect high-quality endpoint telemetry that could directly support the  Detection Engineering (DE) team. […]

Radar Vision for the SOC: Using Micro-Doppler Physics to Spot Invisible C2 Beaconing

The Core Concept: Radar to Response The Micro-Doppler Effect refers to frequency modulations around the main Doppler shift caused by small periodic movements (e.g., a rotating helicopter blade). In physics, these modulations reveal a target’s unique characteristic signature. From Counter-UAV Defense to Cyber Defense My inspiration comes directly from Defense Radar Signature Analysis. In a […]

Shai Hulud 2.0: A Blue Team Analysis of One of the Fastest-Spreading npm Supply Chain Attacks

Shai Hulud 2.0 represents a paradigm shift in supply chain attack sophistication. Through analysis of 569 compromised repositories and 1,273 decoded artifacts on December 02, 2025 10:30 IST, we’ve an analysis that provides defenders with actionable intelligence, detection signatures, and mitigation strategies. Key Findings Attack Overview: How Shai Hulud 2.0 Works Shai Hulud 2.0 follows […]

EPOINT-AES: Detection Engineering Notes for North Korean APT DLL Loader

Introduction This Detection engineering brief is based on the analysis of an advanced North Korean APT multi-stage malware framework (EPOINT-AES) documented in my previous blog. The malware represents a sophisticated attack chain incorporating AES-encrypted payloads, Donut-generated shellcode, AMSI bypass techniques, and memory-only execution patterns. The framework is designed for covert operations with multiple evasion techniques […]

EPOINT-AES: North Korean APT Multi-Stage DLL Loader Framework

Introduction This analysis documents a sophisticated multi-stage malware framework discovered during an investigation into North Korean Advanced Persistent Threat (APT) activities. The framework was identified as part of a broader campaign targeting critical infrastructure and high-value intelligence targets. The technical assessment in this document results from reverse engineering efforts performed on malware samples recovered from […]

Inside the Shellcode: Dissecting North Korean APT43’s Advanced PowerShell Loader

The PowerShell script analyzed in this document (shell.ps1) was recovered from an unprecedented takedown operation of North Korean APT infrastructure, security researchers gained access to actual malware and operational tools used by Kimsuky/APT43. This rare opportunity allows us to analyze authentic, state-sponsored malware rather than samples collected from targeted organizations. This analysis provides insight into […]

Tracking the Trackers: Lessons from the APT43/Kimsuky Takedown

Introduction This technical analysis is derived from the groundbreaking “APT Down, The North Korea Files” published in Phrack Magazine Issue 72. Our security team gained unprecedented access to the actual infrastructure, logs, and code of Kimsuky/APT43, a North Korean state-sponsored threat actor, following a major takedown operation. This rare opportunity to analyze real attacker […]

njRAT: Network Detection, Behavioral Analysis, and Validation (Part 3/3)

Executive Summary This final blog in the series focuses on advanced network detection techniques, cross-variant behavioral analysis, and validation strategies for njRAT detection rules. We provide field-ready simulation plans and operational guidance for SOC teams. High-Fidelity Network Detection for njRAT JA3/JA3S Fingerprints for njRAT Variants Collection Point: Network traffic capture at SPAN port or proxy […]

njRAT: Detection Engineering and Telemetry Analysis (Part 2/3)

Executive Summary This blog provides operational detection engineering guidance for njRAT, focusing on high-fidelity telemetry analysis and deployable detection rules. Based on observed campaign telemetry, we present specific detection opportunities that can be implemented immediately in enterprise environments. Kill Chain Mapping (Exact Telemetry Anchors) Kill Chain Mapping Initial Access Execution Persistence Privilege Escalation Defense Evasion […]

njRAT: Threat Landscape and Delivery Evolution (2024-2025) (Part 1/3)

Executive Summary njRAT remains one of the most persistent and adaptable remote access trojans in the cybercriminal ecosystem, with continued evolution in evasion techniques and targeting patterns. This blog provides a comprehensive analysis of njRAT’s threat landscape, delivery vectors, and operational evolution based on observed telemetry and campaign analysis. Current Threat Context Recent Campaigns and […]

Analyzing the new Interlock Malware PHP variant which uses updated KongTuke for delivery

Introduction Interlock ransomware is a Malware-As-A-Service (Maas) group which provides its affiliates with variations and evolutions of the Interlock malware. Having emerged in the late stages of 2024, it is a relatively new group to the ransomware scene. With operations similar to Lockbit but nowhere near the advertisement and self-promotion, they’ve chosen to lie low […]

Lumma Stealer: Advanced Network Detection and Validation (Part 3/3)

This final blog in the series provides essential network detection techniques and validation strategies for Lumma Stealer. We focus on high-fidelity network indicators and practical validation approaches that can be implemented immediately. High-Fidelity Network Detection JA3 Fingerprinting Lumma’s TLS handshakes can be identified by a unique JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1. This fingerprint corresponds to specific TLS […]

Lumma Stealer: Detection Engineering and Telemetry Analysis (Part 2/3)

In this blog, we focus on operational detection engineering guidance for Lumma Stealer, focusing on high-fidelity telemetry analysis and deployable detection rules. Based on observed campaign telemetry, we present specific detection opportunities that can be implemented immediately in enterprise environments. Kill Chain Mapping (Exact Telemetry Anchors) Initial Access Lumma Stealer’s campaigns often begin with social […]

Anatsa Malware Campaign: A Stealthy Banking Trojan Inside Google Play

In today’s mobile-first world, malware authors are adapting rapidly, and few demonstrate this better than the Anatsa malware, also known as TeaBot. Disguised as legitimate utility apps and distributed through the Google Play Store, Anatsa is a dangerous Android banking trojan designed to steal credentials, hijack accounts, and perform unauthorized transactions with alarming stealth. What […]

Lumma Stealer: Threat Landscape and Delivery Evolution (2024-2025) (Part 1/3)

Lumma Stealer has emerged as one of the most prolific infostealer threats in the cybercriminal ecosystem, with a 369% increase in infections from early to late 2024. This blog provides a comprehensive analysis of Lumma’s threat landscape, delivery vectors, and operational evolution based on observed telemetry and campaign analysis. Over the past year, Lumma Stealer […]

Scaling with Purpose: Welcoming Sharad Sanghi to Bloo

We’re delighted to welcome Sharad Sanghi to Bloo’s Strategic Advisory Board. A pioneering force in India’s tech infrastructure, he founded Netmagic in 1998, effectively building the country’s first data center, and guided it to become the leading managed cloud services provider under his leadership When you’re building a cybersecurity platform that needs to process millions […]

Anomalous DLL Call Stack Sequence Detection: A Threat Hunter’s Guide to Process Injection

The Problem: Why Call Stack Analysis Matters In the world of endpoint detection, we’re constantly chasing the next big thing. But sometimes, the most powerful detection capabilities are hiding in plain sight. Take Sysmon Event ID 10 (Process Access), it’s not just about which process accessed what. The real gold is in the CallTrace […]

Dark-Kill: How Custom Callbacks Disable EDRs

In today’s rapidly evolving threat landscape, attackers are constantly innovating to bypass endpoint defenses. One such sophisticated method involves tampering with process creation notifications at the kernel level, leveraging Windows’ internal APIs. In particular, the `PsSetCreateProcessNotifyRoutine` function has become a tool of choice for advanced attackers aiming to disable Endpoint Detection and Response (EDR) systems. […]

Domain Generation Algorithms: How I Learned to Stop Worrying and Love the Mathematical Formulae

Cybersecurity is an ever expanding field where more domains keep getting added as we progress with technology. These domains try to address very specific problems that may arise, for example Container Security or Application Security seek to address issues with Containers and Applications (Web/Android/iOS etc.) respectively. It is however important to remember that all of […]

Kill the Threat: How the “Cyber Kill Chain” Helps You Stop Attacks Early

Today, in the digital world, cyber-attacks are no longer a matter of “if”, “but” “when”. Attacks happen every minute, from phishing to sophisticated ransomware campaigns. It is no longer sufficient to only respond to breaches. Cybersecurity professionals must understand “how” and “why” an attack occurs. This is where the “Cyber Kill Chain” comes into play, […]

From Headlines to Slack: Automating Cyber Threat Intelligence Delivery

As a Cybersecurity Analyst, staying ahead of the ever-evolving threat landscape is a non-negotiable part of the job. But in a fast-paced environment, manually looking through multiple sources for the latest cybersecurity news can be inefficient and unsustainable. That’s what sparked the idea for the “Threat Intel Automation” project: an initiative to automate the entire […]

The Levenshtein Mile

In the previous article we covered the topic of Domain Generation Algorithm (DGA) and our subsequent efforts to detect the same using the Shannon Entropy formula by using the randomness of the characters in the domain itself to detect a suspected malicious domain. In this blog we move onto another security evil which seems to […]

Reducing Data Lake Costs on AWS by 80%: A High-Level Strategy Guide

At DNIF Hypercloud, a cybersecurity company processing millions of security events per second, data is at the core of everything we do. Our workloads are incredibly data-intensive, which means managing our data lake infrastructure on AWS is crucial for both performance and cost efficiency. This blog post shares the key insights and strategies that enabled […]

Launch Day – Bloo Systems Inc

It’s June 16, 2025 – today, we’re launching Bloo, a cybersecurity company born from a simple but frustrating truth: Despite decades of investment in tools, platforms, and MDR services, threat detection still fails when it matters most. The Gap We See Security teams don’t struggle because they lack alerts. They struggle because they lack assurance. […]

What’s in the name?

Bloo is inspired by the defenders. The name draws from Blue Teams, those who stand guard over infrastructure, data, and people. But it also nods to Blue Ocean Strategy: a belief that the best way forward isn’t to fight in saturated markets, but to build new paths through deep innovation and clarity of purpose. And […]

Beyond the Hype: Why Battle-Tested Detections are Crucial for Effective MDR

Managed Detection and Response (MDR) has become a cornerstone of modern cybersecurity, offering organizations a lifeline in the face of increasingly sophisticated attacks. However, the effectiveness of any MDR service hinges on the quality of its detections. Too often, organizations find themselves reliant on MDR providers that utilize unproven or poorly validated detections, leaving them […]

Starting the Journey: Why Detection Engineering Needs to Evolve Beyond the Basics

When I first got involved in detection engineering, I saw it the way most practitioners do, writing correlation rules, refining signatures, and responding to alerts. The job felt structured, almost mechanical at times. But over the years, as I spent more time analyzing real-world threats and observing how attackers operate, a persistent thought kept […]

Re-imagining Threat Intelligence: From Consuming Feeds to Building Context

When I first started working closely with threat intelligence, I realized how often it sits in organizations as a passive function, subscriptions to feeds, lists of indicators, and reports that get read but rarely acted upon. It felt more like a checkbox exercise than something driving real value. Over time, though, my perspective evolved. […]

The MDR Reality Check: Overcoming the Challenges of Modern Threat Detection

In today’s world, Managed Detection and Response (MDR) has become essential for strong cybersecurity, giving organizations a way to defend themselves against increasingly complex attacks. However, the truth is that an MDR service is only as good as its detections. All too often, organizations find themselves depending on MDR providers that use unproven or poorly […]

Why your MDR needs AI

As someone who has been navigating the cybersecurity landscape for quite some time, I’ve seen the evolution of threat detection and response firsthand. From the days of basic antivirus programs to today’s sophisticated Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) solutions, it’s clear that artificial intelligence (AI) plays a pivotal role […]

Search

Tags

Stay Updated

Subscribe to our newsletter for the latest insights and updates in cybersecurity.

We use cookies to provide essential site functionality and, with your consent, to analyze site usage and enhance your experience. View our Privacy Policy