Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

An attack group, dubbed “Desert Falcons” by Kaspersky Lab, appears to be the first known Arabic cyber-espionage group to develop and run full-scale cyber-espionage operations.
The Vawtrak banking malware now leverages macros and the Windows PowerShell scripting tool to infect computers, Trend Micro reported on Monday.
A multinational gang of cybercriminals infiltrated more than 100 banks across 30 countries and made off with up to one billion dollars over a period of roughly two years, Kaspersky Lab said on Saturday.
An individual claiming to be one of the developers of the RIG exploit kit has leaked the source code for what appears to be a fairly recent version of the exploit kit.
The developers of the Simplocker Android ransomware are trying to make it more difficult to recover encrypted files without paying up.
XOR.DDoS is a piece of malware that's used by Chinese threat actors to launch DDoS attacks from Linux and other types of systems.
iOS spyware used by the Pawn Storm cyber espionage group to steal valuable information from targets.
Adobe Flash Player vulnerabilities, malvertising and file-less infections are the key ingredients in a campaign dubbed by researchers "Fessleak"
Facebook malware infected at least 260,000 users. The Trojan is designed to like posts, subscribe to profiles and follow people on Twitter.
A new variant of the Dyre Trojan targets 355 banks. The malware leverages a worm for distribution, and SSL, I2P and DGA for evasion.

FEATURES, INSIGHTS // Malware

rss icon

Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.