Mapping Out a Malware Distribution Network

More than a dozen US-based web servers were used to host 10 malware families, distributed through mass phishing campaigns. Malware families include Dridex, GandCrab, Neutrino, IcedID and others. Evidence suggests the existence of distinct threat actors… Continue reading Mapping Out a Malware Distribution Network

Tricks and COMfoolery: How Ursnif Evades Detection

Ursnif is one of the main threats that is effectively evading detection right now (at publication) The dropper uses a COM technique to hide its process parentage WMI is used to bypass a Windows Defender attack surface reduction rule Fast evolution of d… Continue reading Tricks and COMfoolery: How Ursnif Evades Detection

Cybercriminals Use Bitcoin as One Method of Laundering Money | Part 1

We are following the money to see what happens to the proceeds from cybercrime. This research shows cybercriminals are money laundering through both familiar and unfamiliar channels. Reserve your copy of the full report: Into the Web of Profit In April… Continue reading Cybercriminals Use Bitcoin as One Method of Laundering Money | Part 1

Anatomy of Meltdown – A Technical Journey

This blog reviews the details of Meltdown and discusses the inherent immunity for end users provided by Bromium’s architecture. Meltdown is an Intel CPU vulnerability leveraging speculative execution which gives an attacker-controlled process the… Continue reading Anatomy of Meltdown – A Technical Journey

Ian Pratt, Bromium Co-Founder, Why Bromium is Releasing an Upgrade [Video]

The Intel chip vulnerability triggered Spectre and Meltdown – information leakage vulnerabilities. With the advent of the Microsoft Windows patch, it’s important to upgrade Bromium first to keep your security intact. Micro-virtualization ca… Continue reading Ian Pratt, Bromium Co-Founder, Why Bromium is Releasing an Upgrade [Video]