I know what you did last summer, MuddyWater blending in the crowd

This report details a collection of tools used by MuddyWater threat actor on its targets after initial infection. It also details deceptive techniques used to divert investigations once attack tools have been deployed inside victim systems. Continue reading I know what you did last summer, MuddyWater blending in the crowd

Tricks and COMfoolery: How Ursnif Evades Detection

Ursnif is one of the main threats that is effectively evading detection right now (at publication) The dropper uses a COM technique to hide its process parentage WMI is used to bypass a Windows Defender attack surface reduction rule Fast evolution of d… Continue reading Tricks and COMfoolery: How Ursnif Evades Detection

GandCrab ransomware and Ursnif virus spreading via MS Word macros

Security researchers have discovered two separate malware campaigns, one of which is distributing the Ursnif data-stealing trojan and the GandCrab ransomware in the wild, whereas the second one is only infecting victims with Ursnif malware.

Though bot… Continue reading GandCrab ransomware and Ursnif virus spreading via MS Word macros

3 New Code Execution Flaws Discovered in Atlantis Word Processor

This is why you should always think twice before opening innocent looking email attachments, especially word and pdf files.

Cybersecurity researchers at Cisco Talos have once again discovered multiple critical security vulnerabilities in the Atlantis … Continue reading 3 New Code Execution Flaws Discovered in Atlantis Word Processor

Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer

Cybersecurity researchers have revealed an unpatched logical flaw in Microsoft Office 2016 and older versions that could allow an attacker to embed malicious code inside a document file, tricking users into running malware onto their computers.

Discov… Continue reading Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer

Crashing Mobile Apps Capture Screens, Leak Private Data

Several developer tools capture a screen as an app crashes and send it to a third-party server creating a risk of corporate data leakage. Continue reading Crashing Mobile Apps Capture Screens, Leak Private Data