Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

To combat the threat of banking Trojans and ransomware, organizations should stay up to date with the rapidly evolving threat landscape by utilizing the latest threat intelligence.

The post Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse appeared first on Security Intelligence.

Continue reading Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

Mapping Out a Malware Distribution Network

More than a dozen US-based web servers were used to host 10 malware families, distributed through mass phishing campaigns. Malware families include Dridex, GandCrab, Neutrino, IcedID and others. Evidence suggests the existence of distinct threat actors… Continue reading Mapping Out a Malware Distribution Network

GootKit Malvertising Brings Redirection Attacks to Italian Banks

The cybergang behind GootKit followed up its recent U.K. activity by launching redirection attacks at Italian banking services.

The post GootKit Malvertising Brings Redirection Attacks to Italian Banks appeared first on Security Intelligence.

Continue reading GootKit Malvertising Brings Redirection Attacks to Italian Banks

GootKit Launches Redirection Attacks in the UK

X-Force researchers discovered that the cybergang behind the GootKit banking Trojan recently began launching redirection attacks in the U.K.

The post GootKit Launches Redirection Attacks in the UK appeared first on Security Intelligence.

Continue reading GootKit Launches Redirection Attacks in the UK

GootKit Developers Dress It Up With Web Traffic Proxy

X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.

The post GootKit Developers Dress It Up With Web Traffic Proxy appeared first on Security Intelligence.

Continue reading GootKit Developers Dress It Up With Web Traffic Proxy

GootKit Developers Dress It Up With Web Traffic Proxy

X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.

The post GootKit Developers Dress It Up With Web Traffic Proxy appeared first on Security Intelligence.

Continue reading GootKit Developers Dress It Up With Web Traffic Proxy

Inside the RIG Exploit Kit

In a deep analysis of RIG, Cisco Talos team outlined the way the exploit kit combines different web technologies such as DoSWF, JavaScript, Flash and VBscript to obfuscate attacks. Continue reading Inside the RIG Exploit Kit

GootKit: Bobbing and Weaving to Avoid Prying Eyes

IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.

The post GootKit: Bobbing and Weaving to Avoid Prying Eyes appeared first on Security Intelligence.

Continue reading GootKit: Bobbing and Weaving to Avoid Prying Eyes