Why Most Organizations Still Can’t Defend against DCShadow – Part 2

In part 1 of this blog post, I talked about the threat that DCShadow poses to organizations that use Microsoft Active Directory (AD). Here in part 2, I’ll talk about steps you can take to protect your organization. (Quick recap: DCShadow is a fea… Continue reading Why Most Organizations Still Can’t Defend against DCShadow – Part 2

[SANS ISC] Simple Mimikatz & RDPWrapper Dropper

I published the following diary on isc.sans.edu: “Simple Mimikatz & RDPWrapper Dropper“: Let’s review a malware sample that I spotted a few days ago. I found it interesting because it’s not using deep techniques to infect its victims. The initial sample is a malicious VBScript. For a few weeks, I started

[The post [SANS ISC] Simple Mimikatz & RDPWrapper Dropper has been first published on /dev/random]

Continue reading [SANS ISC] Simple Mimikatz & RDPWrapper Dropper

RDP Servers, Mimikatz, & LibreOffice – Hack Naked News #206

    This week, RDP Servers Can Hack Client Devices, Roughly 500,000 Ubiquiti devices may be affected by a flaw already exploited in the wild, Crypto exchange in limbo after the founder dies with password, Home DNA kit company says its working with the … Continue reading RDP Servers, Mimikatz, & LibreOffice – Hack Naked News #206

Cybercriminals ‘hide in plain sight’ to shake down West African financial players

Cybercriminals are using a combination of hacking techniques to target financial institutions throughout West Africa, according to research published Thursday by Symantec. Firms in Cameroon, Congo, Ghana, Equatorial Guinea and Ivory Coast have been hit with cyberattacks that combine known forms of malicious software with “living off the land” techniques to infiltrate organizations. “Living off the land” is industry jargon that refers to hackers’ exploitation of otherwise benign tools already installed on a computer. In this case, attackers used PowerShell scripts, remote desktop protocols and Microsoft administration tools in gaining access to their targets, researchers found. Symantec identified four types of such cyberattacks but did not attribute them to any specific hacking group. Instead it described the research as an example the globalization of cybercrime. “Until now, Symantec has seen relatively little evidence of these kinds of attacks against the financial sector,” the company said in a blog post. “However, it now appears […]

The post Cybercriminals ‘hide in plain sight’ to shake down West African financial players appeared first on CyberScoop.

Continue reading Cybercriminals ‘hide in plain sight’ to shake down West African financial players