Old MS Office feature weaponized in malspam attacks

An old Microsoft Office feature has been brought back to the forefront as way to distribute malware without relying on macros or exploits.
Categories:

Malware
Threat analysis

Tags: DDEDDEAUTOmacromalspammalwaremicrosoftOfficeword

(Read more…. Continue reading Old MS Office feature weaponized in malspam attacks

Decoy Microsoft Word document delivers malware through a RAT

A Remote Administration Tool (RAT) is delivered via an unusual route: a benign-looking Microsoft Word document with an ulterior motive.
Categories:

Exploits
Threat analysis

Tags: CVE-2017-0199CVE-2017-8759exploitsratWord exploits

(Read more…. Continue reading Decoy Microsoft Word document delivers malware through a RAT

Compromised LinkedIn accounts used to send phishing links via private message and InMail

A recent attack uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external members via email.
Categories:
Social engineering
Threat analysis
Tags: gmailinmailLinkedInmalwarephishingscamSocia… Continue reading Compromised LinkedIn accounts used to send phishing links via private message and InMail

Expired domain names and malvertising

A look at how expired domain names can be turned into a lucrative malicious traffic redirection tool.
Categories:
Malware
Threat analysis
Tags: domainmalvertisingmalwareregistrantregistrartech support scam

(Read more…)

The post Expired domain na… Continue reading Expired domain names and malvertising

RIG exploit kit distributes Princess ransomware

A new campaign via the RIG exploit kit is pushing the Princess ransomware.
Categories:
Cybercrime
Exploits
Tags: exploit kickmalwareprincess ransomwareransowmareRIG

(Read more…)

The post RIG exploit kit distributes Princess ransomware appeared f… Continue reading RIG exploit kit distributes Princess ransomware

Cerber ransomware delivered in format of a different order of Magnitude

We review a trick that the Magnitude exploit kit uses to bypass security scanners.
Categories:
Exploits
Threat analysis
Tags: binary paddingcerberexploit kitgateMagnigatemagnitude EKransomwareXML

(Read more…)

The post Cerber ransomware delivered… Continue reading Cerber ransomware delivered in format of a different order of Magnitude

Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain

This post shines some light on a ‘gate’ belonging to the geo-targeted Magnitude exploit kit.
Categories:
Cybercrime
Exploits
Tags: cerberEKexploit kitkoreaMagnigateMagnitudemalvertisingransomware

(Read more…)

The post Enemy at the gates: Reviewi… Continue reading Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain

AdGholas malvertising thrives in the shadows of ransomware outbreaks

Several large malvertising campaigns went unnoticed amidst the news of the latest ransomware outbreak.
Categories:
Cybercrime
Exploits
Tags: adgholasastrumEKexploit kitmalvertising

(Read more…)

The post AdGholas malvertising thrives in the shado… Continue reading AdGholas malvertising thrives in the shadows of ransomware outbreaks

The numeric Tech Support Scam campaign

A new tech support scam campaign is being pushed in lieu of exploit kits. We take a look at its distribution method and how it is able to bring browsers to their knees.
Categories:
Social engineering
Threat analysis
Tags: eitestexploit kitmalvertisin… Continue reading The numeric Tech Support Scam campaign

New social engineering scheme triggers on mouse movement

No macro, no exploit. This attack uses mouse movement to launch malicious code in booby-trapped documents.
Categories:
Social engineering
Threat analysis
Tags: PowerPointpowershellSocial Engineering

(Read more…)

The post New social engineering s… Continue reading New social engineering scheme triggers on mouse movement