Technical Analysis of NailaoLocker Ransomware

This is the English version of the Japanese article “ランサムウェアNailaoLockerの調査“. In February 2025, several cybersecurity vendors published a report about a ransomware named NailaoLocker.Compared to other ransomware attacks, NailaoLocker was special because it was deployed along with malware (RAT) such as PlugX and ShadowPad. PlugX and ShadowPad is mainly used for cyber espionage purposes, by threat actors with nation-state background....

READ MORE Technical Analysis of NailaoLocker Ransomware

The Highlights and Sample Slides for Our Training Course at Black Hat USA 2018

We are going to provide a new training course named “Practical Incident Response With Digital Forensics & Malware Analysis” at Black Hat USA 2018 in this August. The course outline is in the above link. In this blog, we focus on several highlights of our course, and we also provide several course slide samples. Comprehensive and Practical DFIR (Digital Forensics...

READ MORE The Highlights and Sample Slides for Our Training Course at Black Hat USA 2018

Warnings on the Use of the Online Functions of an IME

In an environment that deals with multibyte text such as Japanese, an IME (Input Method Editor) is an indispensable function. Recently, cloud-related functions that need to always be connected to the Internet have been implemented in these IMEs. These are valuable functions if used well, but here I give an explanation of some warnings concerning their use. The definitions of...

READ MORE Warnings on the Use of the Online Functions of an IME