Tech support scammers GeeksHelp caught again, two years later

Almost two years after exposing a group of tech support scammers, we stumbled upon them again, this time under the moniker GeeksHelp.
Categories:

Social engineering
Threat analysis

Tags: AmericaGeeksGeeksFranceGeeksHelptech support scammers

Continue reading Tech support scammers GeeksHelp caught again, two years later

Encryption 101: How to break encryption

Continuing on in our Encryption 101 series, we now look at what it takes to break encryption. In order for something as powerful as encryption to break, there needs to be some kind of weakness to exploit. That weakness is often a result of an erro… Continue reading Encryption 101: How to break encryption

Massive DDoS attack washes over GitHub

We take a look at the colossal DDoS attack on GitHub, the largest-ever on record. How did threat actors do it, and what can companies do to protect against it?
Categories:

Criminals
Threat analysis

Tags: ddosDDos attackGitHubmemcachedmemcrashe… Continue reading Massive DDoS attack washes over GitHub

Blast from the past: stowaway Virut delivered with Chinese DDoS bot

A recent Chinese drive-by attack dropped Virut, an ancient virus that’s been out of commission since 2013. So what was it doing in this modern attack?
Categories:

Malware
Threat analysis

Tags: avzhanAvzhan DDoS botChinese drive-by attackDDoS bo… Continue reading Blast from the past: stowaway Virut delivered with Chinese DDoS bot

New RIG malvertising campaign uses cryptocurrency theme as decoy

This malvertising campaign uses a popular cryptocurrency theme to redirect users to the RIG exploit kit.
Categories:

Exploits
Threat analysis

Tags: cryptocurrenciesmalvertisingRIGRIGEK

(Read more…)

The post New RIG malvertising campa… Continue reading New RIG malvertising campaign uses cryptocurrency theme as decoy

Encryption 101: ShiOne ransomware case study

In this case study on ShiOne ransomware, part of our Encryption 101 series, we will be reviewing the encryption process line by line and showing the different methods ransomware can use to encrypt files.
Categories:

Malware
Threat analysis

Tags… Continue reading Encryption 101: ShiOne ransomware case study

Avzhan DDoS bot dropped by Chinese drive-by attack

The Avzhan DDoS bot is back in the wild again, this time being dropped by a Chinese drive-by attack. In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past.
Categories:

M… Continue reading Avzhan DDoS bot dropped by Chinese drive-by attack

Avzhan DDoS bot dropped by Chinese drive-by attack

The Avzhan DDoS bot is back in the wild again, this time being dropped by a Chinese drive-by attack. In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past.
Categories:

M… Continue reading Avzhan DDoS bot dropped by Chinese drive-by attack

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:

Threat analysis

Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:

Threat analysis

Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits