Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new variant of the HawkEye keylogger/information stealer is being leveraged in ongoing malware distribution campaigns. [Read More]
Garfield County, Utah, was recently affected by ransomware that apparently encrypted enough systems to require County officials to switch to paper administration. [Read More]
A recently patched Windows zero-day vulnerability tracked as CVE-2019-0859 had been exploited to deliver a PowerShell backdoor. [Read More]
Feedback Friday: Industry professionals comment on the news that the group behind the Triton/Trisis malware has hit an additional critical infrastructure facility. [Read More]
Kaspersky publishes new report on the activities of the Hamas-linked Gaza Cybergang and claims much of its infrastructure has been disrupted. [Read More]
The DHS and FBI have attributed a new Trojan they track as HOPLIGHT to a notorious threat group believed to be backed by the North Korean government. [Read More]
New stealer malware called Baldr first appeared towards the end of 2018, but has gone through many versions, suggesting that the author is fixing bugs and interested in developing new features. [Read More]
Researchers discover a sophisticated APT, named TajMahal, that can steal data from CDs, thumb drives and even printer queues. [Read More]
The tools and TTPs used by the threat group behind the Triton/Trisis malware show that the hackers are focused on maintaining access to compromised systems. [Read More]
The Flame platform was believed dead following public exposure in 2012, but recently discovered evidence suggests that it remained alive, albeit very well hidden, security researchers at Alphabet-owned Chronicle reveal. [Read More]

FEATURES, INSIGHTS // Malware

rss icon

Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”
Siggi Stefnisson's picture
The FUD crypter service industry is giving a second life to a lot of old and kind-of-old malware, which can be pulled off the shelf by just about anybody with confused ethics and a Bitcoin account.
John Maddison's picture
Cryptojacking malware grew from impacting 13% of all organizations in Q4 of 2017 to 28% of companies in Q1 of 2018, more than doubling its footprint.
Siggi Stefnisson's picture
A study found that over 98 percent of malware making it to the sandbox array uses at least one evasive tactic, and 32 percent of malware samples making it to this stage could be classified as “hyper-evasive".
Justin Fier's picture
The cost of electricity has led some to take shortcuts in the search for power sources - individuals and organizations are now being breached by cyber-criminals seeking to take advantage of corporate infrastructures.
Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.