Internet of Threats: IoT Botnets Drive Surge in Network Attacks

As Internet of things (IoT) devices in homes, industrial environments, transportation networks and elsewhere continue to proliferate, so does the attack surface for malicious IoT network attackers. IoT attack activity in 2020 dramatically surpassed the combined volume of IoT activity observed by IBM Security X-Force in 2019. Turning our attention to the factors behind this […]

The post Internet of Threats: IoT Botnets Drive Surge in Network Attacks appeared first on Security Intelligence.

Continue reading Internet of Threats: IoT Botnets Drive Surge in Network Attacks

Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts

IBM X-Force threat intelligence has been observing a rise in Dridex-related network attacks that are being driven by the Cutwail botnet. Dridex is delivered as a second-stage infector after an initial document or spreadsheet arrives via email with booby-trapped macros. Recipients who activate the macros unknowingly launch malicious PowerShell scripts that will download additional malware. […]

The post Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts appeared first on Security Intelligence.

Continue reading Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts

Traveling This Holiday Season? Beware of RFID Attacks

Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.

The post Traveling This Holiday Season? Beware of RFID Attacks appeared first on Security Intelligence.

Continue reading Traveling This Holiday Season? Beware of RFID Attacks

Steganography: A Safe Haven for Malware

Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.

The post Steganography: A Safe Haven for Malware appeared first on Security Intelligence.

Continue reading Steganography: A Safe Haven for Malware

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

IBM Managed Security Services (MSS) detected a sixfold increase in attacks involving embedded CPU mining tools between January and August 2017.

The post Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold appeared first on Security Intelligence.

Continue reading Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Apache Struts 2: A Zero-Day Quick Draw

It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.

The post Apache Struts 2: A Zero-Day Quick Draw appeared first on Security Intelligence.

Continue reading Apache Struts 2: A Zero-Day Quick Draw

Andromeda: A Galaxy of Pain, Coming to a Machine Near You

The IBM X-Force team analyzed the Andromeda malware and determined that its operators have shifted their attention to the payment card industry.

The post Andromeda: A Galaxy of Pain, Coming to a Machine Near You appeared first on Security Intelligence.

Continue reading Andromeda: A Galaxy of Pain, Coming to a Machine Near You

Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

A recent IBM X-Force report found that attacks against industrial control systems (ICS) increased significantly in 2016 over last year’s numbers.

The post Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent appeared first on Security Intelligence.

Continue reading Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent