Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical … Continue reading Fileless malware: getting the lowdown on this insidious threat

Exploit kits: summer 2018 review

Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review.
Categories:

Exploits
Threat analysis

Tags: drive-by downloadsdrive-bysEKEKsexploit kitsgrandsoftGreenFlash S… Continue reading Exploit kits: summer 2018 review

‘Hidden Bee’ miner delivered via improved drive-by download toolkit

Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign.
Categories:

Exploits
Threat analysis

Tags: bootkitcryptominerdrive-by attackexploithidden beehidden bee minerMBR

(Read more…… Continue reading ‘Hidden Bee’ miner delivered via improved drive-by download toolkit

New strain of Mac malware Proton found after two years

A new variant of the Mac malware Proton, which was rampant on macOS last year, has been found dating back to at least two years ago. Learn how this could still affect your Mac today.
Categories:

Mac
Threat analysis

Tags: AppleCalistomacProton m… Continue reading New strain of Mac malware Proton found after two years

Decision Analysis Applications in Threat Analysis Frameworks

Cybersecurity is generally considered to be a highly reactive field where professionals struggle to keep up with new and emerging threats. As the profession works to become more human-centered and proactive, I have attempted to design a new modeling pr… Continue reading Decision Analysis Applications in Threat Analysis Frameworks

Obfuscated Coinhive shortlink reveals larger mining operation

A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.
Categories:

Cryptomining
Threat analysis

Tags: cnhvcoinhiveminingmoneroshortlinks

(Read more…… Continue reading Obfuscated Coinhive shortlink reveals larger mining operation

New macro-less technique to distribute malware

The latest macro-less technique to distribute malware via Office documents does not involve exploits. Just a little bit of social engineering.
Categories:

Threat analysis

Tags: deeplinkmacro-lessmalwareOfficesettingcontent-ms

(Read more…)
Continue reading New macro-less technique to distribute malware

SamSam ransomware: controlled distribution for an elusive malware

SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.
Categories:

Malware
Threat analysis

Tags: ransomwaresamsamsamsam ransomware

(Read more…)

The post SamS… Continue reading SamSam ransomware: controlled distribution for an elusive malware

Instagram story spam claims free Apple Watch

We take a look at Instagram story spam leading to a “free Apple Watch” giveaway on a recently compromised celebrity account.
Categories:

Social engineering
Threat analysis

Tags: Apple WatchInstagramscamsocial mediasocial networkspamsurveysurvey… Continue reading Instagram story spam claims free Apple Watch