HawkEye Malware Operators Renew Attacks on Business Users

IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.

The post HawkEye Malware Operators Renew Attacks on Business Users appeared first on Security Intelligence.

Continue reading HawkEye Malware Operators Renew Attacks on Business Users

How to Fight Back Against Macro Malware

Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity?

The post How to Fight Back Against Macro Malware appeared first on Security Intelligence.

Continue reading How to Fight Back Against Macro Malware

Credential Dumping Campaign Hits Multinational Corporations

X-Force researchers observed attackers targeting multinational corporations in various sectors using malicious scripts to automate attacks on misconfigured servers.

The post Credential Dumping Campaign Hits Multinational Corporations appeared first on Security Intelligence.

Continue reading Credential Dumping Campaign Hits Multinational Corporations

Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns

IBM X-Force researchers observed cybercriminals engaging in three tax-themed malware campaigns likely aimed at businesses but with the potential to spread to consumers as well.

The post Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns appeared first on Security Intelligence.

Continue reading Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns

Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control

IBM X-Force found a zero-day buffer overflow vulnerability in one of the most common routers on the market that could let malicious third parties take control of the device from a remote location.

The post Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control appeared first on Security Intelligence.

Continue reading Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control

Cryptojacking Attacks: Who’s Mining on Your Coin?

X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.

The post Cryptojacking Attacks: Who’s Mining on Your Coin? appeared first on Security Intelligence.

Continue reading Cryptojacking Attacks: Who’s Mining on Your Coin?

IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth

IBM X-Force analyzed modifications made to IcedID that help the banking Trojan act more stealthily on infected devices.

The post IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth appeared first on Security Intelligence.

Continue reading IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth

The Business of Organized Cybercrime: Rising Intergang Collaboration in 2018

In 2018, IBM X-Force researchers observed organized cybercrime groups collaborating, rather than competing over turf or even attacking each other, for the first time.

The post The Business of Organized Cybercrime: Rising Intergang Collaboration in 2018 appeared first on Security Intelligence.

Continue reading The Business of Organized Cybercrime: Rising Intergang Collaboration in 2018

Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities

According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.

The post Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities appeared first on Security Intelligence.

Continue reading Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities

Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks

Cybercriminals made a lot of noise in 2017 with ransomware attacks like WannaCry and NotPetya, using an in-your-face approach to cyberattacks that netted them millions of dollars from victims. But new research from IBM X-Force, the threat intelligence, research and incident response arm of IBM Security, revealed that 2018 saw a rapid decline in ransomware […]

The post Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks appeared first on Security Intelligence.

Continue reading Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks