SecOps & Risk mitigation
CyberProof uses OSINT and threat intelligence feeds for visibility into threats.
CyberProof’s adaptable playbooks address continuously evolving threats with updated strategies.
Professionals manage sophisticated networks, leveraging experience to counter advanced threats.
Professionals manage sophisticated networks, leveraging experience to counter advanced threats.
24/7 global SOC support ensures incident response with guaranteed SLA.
24/7 global SOC support ensures incident response with guaranteed SLA.
CyberProof develops recovery plans, restoring capabilities after a cyber incident.
Classify and manage enterprise assets, understanding risks and data sensitivity.
Non-destructive tests uncover potential exploits in assets and applications.
Mitigate security issues early with CyberProof’s training and awareness programs.
Rigorous security assessment for on-premise and cloud applications to ensure protection.
IAM manages user access, monitors for anomalies, ensuring security.
Cloud First approach ensures compliance and security within cloud environments.
Managed service for SIEM, EDR, MXDR, and threat intelligence solutions.
Identify, assess, and mitigate security vulnerabilities through regular scanning.
Partners
See all partners“Today I have complete visibility into the entire environment, in real time”
Jamil Farshchi | Equifax CISO
CyberProof Acquires Interpres Security
By leveraging and integrating the Interpres Security CTEM solution into its security services portfolio, CyberProof is able to continuously identify, assess, and prioritize risk while adapting defense services, like MDR, Vulnerability management and Use case management to address ever evolving threats. Take proactive steps to fortify your security today!
Case Studies
Retail Company Reduces Data Costs by 85% with SIEM Transformation

90% increase in visibility after deploying Microsoft XDR with CyberProof

Enterprise saves millions on data ingestion & storage following cloud migration.
SOC unification streamlines enterprise insurance company’s security & network monitoring operations.
Global medical devices company gains visibility and meets stringent compliance standards across global geos
Pharmaceutical organization significantly enhances threat detection and response times
Threat Alerts
Leaked Black Basta Ransomware Chat Logs
In February 2025, a major leak exposed over 200,000 internal messages from the Black Basta ransomware gang, revealing critical insights into their operations. The leak, shared by “ExploitWhispers,” highlights the group’s tactics, including the exploitation of high-severity vulnerabilities such as CVE-2019-19781 in Citrix NetScaler (CVSS 9.8), CVE-2021-34473 in Microsoft Exchange (CVSS 9.8), and CVE-2018-13379 in Fortinet FortiOS (CVSS 9.8). These CVEs have been actively targeted by Black Basta. Additionally, the discussions show that SMB misconfigurations, exposed RDP servers, and weak authentication mechanisms are routinely exploited, often relying on default VPN credentials or brute-forcing stolen credentials.
The leak also provides insights into the gang’s leadership and operations. Key figures, including “Tramp” (Oleg Nefedov), have been identified, and the group has focused on exploiting known vulnerabilities in critical infrastructure sectors. Black Basta’s use of malware droppers and reliance on social engineering tactics demonstrates their evolving attack methods. This information underscores the importance of patching known vulnerabilities, especially those actively exploited in the wild, to mitigate the risk of a breach.
Lumma and ACRStealer Employ Dead Drop Resolver for C2 Evasion
Security researchers have observed a new malware campaign distributing infostealers such as LummaC2 and ACRStealer under the guise of illegal programs like cracks and keygens. ACRStealer employs a Dead Drop Resolver (DDR) technique similar to Vidar and LummaC2, using a legitimate web platform as an intermediary command-and-control (C2) server. Threat actors encode the actual C2 domain in Base64 on a specific webpage, which the malware then accesses and parses to retrieve the real C2 address. This method allows the malware to communicate covertly and execute malicious activities. While Steam has previously been used as an intermediary C2, recent malware campaigns have shifted to leveraging Google Docs (Forms and Presentations) and Telegra.ph for this purpose.
ACRStealer continuously modifies the placement of C2 strings across various platforms, making detection difficult. Currently, these strings are inserted into the ‘summary’ field of certain web services, making them invisible in a standard web browser and only detectable in the page source. The malware constructs the actual C2 URL by combining the retrieved domain with a hardcoded UUID identifier, then downloads configuration data encrypted with Base64 and XOR.
The configuration file used to communicate with the C2 server contains sensitive data stolen from the infected system, including browser data, text files, cryptocurrency wallets, FTP credentials, chat applications, email clients, remote access tools, terminal programs, VPN configurations, password managers, databases, and browser extension plugins. Depending on its configuration, the malware compresses collected files into a ZIP archive before transmitting them to the C2 server.