Cybercrime & Digital Threats
- 09 de enero de 2020The cryptocurrency-miner, a multi-component threat comprised of different Perl and Bash scripts, miner binaries, the application hider Xhide, and a scanner tool, propagates by scanning vulnerable machines and brute-forcing (primarily default) credentials.
- 06 de enero de 2020As the new year rolls in, new developments in different ransomware strains have emerged. Here we discuss the different techniques that Clop, DeathRansom, and Maze ransomware use and the ways users and organizations can protect themselves against infection.
- 27 de diciembre de 2019Financial applications are closely connected or even directly tied to a user’s finances, making them prime targets for cybercriminals. We provide simple steps and guidelines on how to protect mobile banking apps from common scams and malicious actors.
- 20 de diciembre de 2019We take a closer look at an incident involving the MyKings botnet to show how the MITRE ATT&CK framework helps with threat investigation.
- 20 de diciembre de 2019The city of Frankfurt, Germany, became the latest victim of Emotet after an infection forced it to close its IT network.
- 19 de diciembre de 2019We have recently spotted a Negasteal/Agent Tesla variant (detected by Trend Micro as Worm.Win32.NEGASTEAL.B) that uses a new delivery vector: removable drives.
- 18 de diciembre de 2019We listed a rundown of PoCs and real-life attacks where machine learning was weaponized to get a clearer picture of what is possible and what is already a reality with regard to machine learning-powered cyberthreats.
- 16 de diciembre de 2019Multiple government procurement services were targeted by a credential harvesting campaign that uses bogus pages to steal login credentials.
- 13 de diciembre de 2019Researchers found hundreds of malicious Android apps to steal users' information, install adware, and access devices via excessive permissions.