Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations

Researchers discovered a new banking Trojan, TrickBot, that appears to borrow an uncommon webinjection technique from the infamous Dyre family of malware.

The post Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations appeared first on Security Intelligence.

Continue reading Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations

An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK

IBM X-Force researchers reported that TrickBot is fully operational and already capable of deploying two of the most advanced browser manipulation methods.

The post An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK appeared first on Security Intelligence.

Continue reading An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK

Track Relevant Vulnerabilities With Watchlists

The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.

The post Track Relevant Vulnerabilities With Watchlists appeared first on Security Intelligence.

Continue reading Track Relevant Vulnerabilities With Watchlists

Track Relevant Vulnerabilities With Watchlists

The watchlist feature on IBM X-Force Exchange enables network administrators to maintain accurate asset inventories and track relevant vulnerabilities.

The post Track Relevant Vulnerabilities With Watchlists appeared first on Security Intelligence.

Continue reading Track Relevant Vulnerabilities With Watchlists

Threat Monitoring Alerts in the Night: Is Anybody Watching?

Threat monitoring is an essential practice for any security program, but there are many approaches that can be taken when embracing this strategy.

The post Threat Monitoring Alerts in the Night: Is Anybody Watching? appeared first on Security Intelligence.

Continue reading Threat Monitoring Alerts in the Night: Is Anybody Watching?

New, Live, Interactive Phishing Attacks Emerge in Brazil

The newest threat on Brazil’s thriving online fraud scene is interactive phishing, which allows an attacker to steal a victim’s personal data in real time.

The post New, Live, Interactive Phishing Attacks Emerge in Brazil appeared first on Security Intelligence.

Continue reading New, Live, Interactive Phishing Attacks Emerge in Brazil

Protected API Calls and String Constants: Looting Dridex’s Candy Box

Raiding Dridex’s Candy Jar When I was a kid, my mom would give my brothers and me a weekly allowance to buy candy. It was about the equivalent of $2, and if used prudently was just about enough to buy an ice cream bar and a few gummy bears. Some weeks, I’d go for packets […]

The post Protected API Calls and String Constants: Looting Dridex’s Candy Box appeared first on Security Intelligence.

Continue reading Protected API Calls and String Constants: Looting Dridex’s Candy Box

Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed

Distributed denial-of-service (DDoS) attacks have been all over the news in recent months, with hacktivist groups taking major targets completely offline. According to IBM Managed Security Services data, the vast majority of DDoS attacks come in one of two flavors: SYN flood attacks, in which bad actors send multiple SYN requests to a victim’s webserver […]

The post Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed appeared first on Security Intelligence.

Continue reading Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed

Anonymous Unleashes Gold Medal DDoS Tools

The dust, waves and jubilation have settled on the sports festivities of this past summer. Since we’re in the business of cybersecurity, let’s reflect on one of the malicious activities that attempted to derail focus from this spirited event. Going into the games, many analysts expected the event to be marred by cybercriminal activity spanning […]

The post Anonymous Unleashes Gold Medal DDoS Tools appeared first on Security Intelligence.

Continue reading Anonymous Unleashes Gold Medal DDoS Tools

Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks

Co-authored by Hanan Natan. IBM X-Force Research reported that the operators of the Qadars Trojan have been progressively updating the malware’s defenses and tailoring its configurations to target 18 banks in the U.K. In addition to its recent U.K. activity, the researchers found that Qadars campaigns launched in early September 2016 mainly targeted banks in […]

The post Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks appeared first on Security Intelligence.

Continue reading Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks