ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

Financially motivated, adaptable, sophisticated and persistent, the ITG08 threat group is likely to remain one of the most potent cybercriminal groups in this new decade.

The post ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework appeared first on Security Intelligence.

Continue reading ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

EnigmaSpark: Politically Themed Cyber Activity Highlights Regional Opposition to Middle East Peace Plan

In recent analysis of malicious activity likely targeting entities based in the Middle East, IBM X-Force IRIS discovered a backdoor malware strain we named “EnigmaSpark.”

The post EnigmaSpark: Politically Themed Cyber Activity Highlights Regional Opposition to Middle East Peace Plan appeared first on Security Intelligence.

Continue reading EnigmaSpark: Politically Themed Cyber Activity Highlights Regional Opposition to Middle East Peace Plan

IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (COVID-19)

Global events such as the Novel Coronavirus (COVID-19) make all of us attractive targets for cybersecurity criminals. Whether it’s phishing emails or new targeted scams, these tactics are meant to take advantage of citizens who are understandably concerned about their safety and health during this challenging time. COVID-19 email exploits can deliver damaging ransomware and […]

The post IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (COVID-19) appeared first on Security Intelligence.

Continue reading IBM X-Force Threat Intelligence Cybersecurity Brief: Novel Coronavirus (COVID-19)

PXJ Ransomware Campaign Identified by X-Force IRIS

In a recent analysis from IBM’s X-Force Incident Response and Intelligence Services (IRIS), our team discovered activity related to a new strain of ransomware known as PXJ ransomware.

The post PXJ Ransomware Campaign Identified by X-Force IRIS appeared first on Security Intelligence.

Continue reading PXJ Ransomware Campaign Identified by X-Force IRIS

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.

The post State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends appeared first on Security Intelligence.

Continue reading State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

To combat the threat of banking Trojans and ransomware, organizations should stay up to date with the rapidly evolving threat landscape by utilizing the latest threat intelligence.

The post Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse appeared first on Security Intelligence.

Continue reading Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

Emotet Activity Rises as It Uses Coronavirus Scare to Infect Targets in Japan

IBM X-Force has identified a spam campaign targeting users in Japan that employs the Coronavirus scare as a lure to encourage people to open malicious emails.

The post Emotet Activity Rises as It Uses Coronavirus Scare to Infect Targets in Japan appeared first on Security Intelligence.

Continue reading Emotet Activity Rises as It Uses Coronavirus Scare to Infect Targets in Japan

Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia

To understand the similarities between ZeroCleare and Dustman, IBM X-Force researchers took a closer look at their code and the files being used in attacks.

The post Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia appeared first on Security Intelligence.

Continue reading Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia

From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications

MegaCortex seems to be looking for ways to improve, and with each version upgrading the previous release’s functions, our team took a closer look at some of the highlights.

The post From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications appeared first on Security Intelligence.

Continue reading From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications

The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019

Four trends defined data breaches in 2019: million-record breaches, pinpoint ransomware attacks, data left exposed on cloud servers and the struggle of cryptocurrencies to go mainstream.

The post The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019 appeared first on Security Intelligence.

Continue reading The Uncommon Becomes Ordinary: 4 Trends That Defined Data Breaches in 2019