Cyber Labs · Section

Threat Archive

The Deretti Cyber Labs Threat Archive preserves historical research notes, response pages, and technical references created during major malware, ransomware, vulnerability, and infrastructure-defense events.

These materials are preserved for historical and educational value. They reflect the threat landscape, available guidance, and research context at the time they were written or last updated. They should not be treated as current security advisories or production remediation guidance.

Type:
Domain:
Tier:

Entries 14 of 14

2008

Conficker

CVE-2008-4250 · MS08-067 · Worm / Botnet

Windows Server service worm that built one of the largest known botnets, infecting over ten million systems across 190 countries despite an available patch.

Malware Brief Operating System Endpoint Server
2013

NetTraveler

CVE-2010-3333 / CVE-2012-0158 · APT / Espionage

Long-running cyber-espionage campaign exploiting Microsoft Office vulnerabilities to target governments, embassies, and research institutes across more than forty countries.

Threat Actor Campaign Brief Operating System Endpoint Application
2014–ongoing

Rowhammer

DRAM Disturbance Errors · Bit-Flip Exploits · Hardware Microarchitecture

First documented widespread system security vulnerability rooted in a circuit-level hardware failure mechanism; established a vulnerability category that has no software-only fix and continues producing new variants more than a decade after the original 2014 disclosure.

Vulnerability Full Hardware Endpoint Server IoT / Embedded
2016

KeRanger

macOS · Ransomware · Supply-Chain

First fully functional macOS ransomware, distributed via a compromised Transmission BitTorrent client installer signed with a valid developer certificate.

Malware Brief Operating System Endpoint Supply Chain
2017

NotPetya

CVE-2017-0144 · MS17-010 · Wiper / Supply-Chain

Destructive wiper disguised as ransomware, delivered through a compromised Ukrainian tax software update; resulted in approximately ten billion dollars in global damages.

Malware Brief Operating System Endpoint Server Supply Chain
2017

WannaCrypt

CVE-2017-0144 · MS17-010 · Ransomware Worm

Self-propagating ransomware leveraging the EternalBlue SMB exploit; infected over 230,000 systems across 150 countries within days of outbreak.

Malware Brief Operating System Endpoint Server Network Protocol
2018

Spectre and Meltdown

CVE-2017-5753 / 5715 / 5754 · CPU Speculative Execution

Hardware-level vulnerabilities in speculative execution affecting essentially every high-performance CPU designed in the prior two decades; permanently changed how defenders treat the microarchitecture as a threat surface.

Vulnerability Full Hardware Operating System Cloud Service Endpoint Server
2018

VPNFilter

Sandworm · Router and NAS Firmware Implant

State-sponsored modular firmware implant targeting consumer and small-business routers and NAS devices, attributed to Sandworm; disrupted by FBI sinkhole and coordinated vendor response.

Threat Actor Campaign Full Firmware Network Infrastructure IoT / Embedded
2020

Ripple20

JSOF · Treck TCP/IP Stack · 19 CVEs

Nineteen vulnerabilities in the Treck TCP/IP stack embedded in hundreds of millions of IoT, industrial, medical, and infrastructure devices; defined the modern embedded supply-chain disclosure problem.

Vulnerability Full Network Protocol IoT / Embedded Supply Chain
2020

SMBGhost

CVE-2020-0796 · KB4551762 · Wormable RCE

Pre-authentication remote code execution in SMBv3 compression handling, accidentally disclosed via Microsoft's Advance Notification Service before the patch was ready.

Vulnerability Brief Operating System Network Protocol Server Endpoint
2021

Log4Shell

CVE-2021-44228 · Apache Log4j · Supply-Chain RCE

Critical JNDI-injection vulnerability in the ubiquitous Apache Log4j logging library, enabling unauthenticated remote code execution across millions of Java applications.

Vulnerability Brief Application Server Cloud Service Supply Chain
2022

PIPEDREAM (INCONTROLLER)

ICS / OT · State-Sponsored Toolkit

Modular industrial control system attack framework attributed to the CHERNOVITE activity group; discovered and disclosed before any known operational deployment.

Threat Actor Campaign Brief Industrial Control System Network Protocol Firmware
2024

CrowdStrike Falcon — Channel File 291

Endpoint Security · Operational Incident · Vendor Update Failure

Faulty channel-file update to the CrowdStrike Falcon sensor crashed approximately 8.5 million Windows devices globally — the largest IT outage in history. Not a malicious attack, but a defining infrastructure-resilience event.

Operational Incident Brief Operating System Endpoint Supply Chain
2025

ReVault

CVE-2025-24311 / 24922 / 25050 / 25215 · Dell ControlVault3 Firmware

Five firmware vulnerabilities in Dell's ControlVault3 hardware security module — disclosed by Cisco Talos, addressed in Dell advisory DSA-2025-053. Enables authentication bypass, privilege escalation, and persistent firmware backdoors that survive OS reinstall.

Vulnerability Brief Hardware Firmware Cryptography / Identity Endpoint