Author Archives: admin

Zero-Hour Multi Brand Phish

April 16, 2016     No Comments on Zero-Hour Multi Brand Phish     ,      admin

Popular global brands like Yahoo, Gmail, Microsoft, and DropBox are commonly used for Credential Phishing attacks. Typically the attacker creates a replica of the brand’s Sign-in or Password recovery page and attempts to lure victims into entering their confidential information into the fake page. Today, at a large customer site, we witnessed…

PowerWare – A malware built on lies

A couple of weeks ago the folks at Carbon Black discovered a new Ransomware strain that they dubbed “PowerWare”. What makes PowerWare interesting is its ability to encrypt files using the Windows PowerShell scripting language.  Unlike other Ransomware, Powerware doesn’t need to install a binary on the infected machine. When…

Mighty TeslaCrypt

March 30, 2016     No Comments on Mighty TeslaCrypt     ,      admin

Ransomware is not a new concept. Some early examples such as GpCode spread as early as 2006, but the recent surge of new highly advanced Ransomware is like nothing the world has ever seen. Most of what we see today can be traced back to CryptoLocker and CryptoWall.  These two…

Yahoo Email Phishing through Data URI

Hackers have come up with new and innovative way to perform credential phishing attacks. Typical credential phishing is done by creating look-a-like web pages hosted on compromised web servers or servers owned by the attacker himself. The problem for an attacker is that eventually signature based technologies catch up and black list…

Cerber Ransomware

March 21, 2016     No Comments on Cerber Ransomware     ,      admin

“Cerber” is widely believed to have been developed by Russian coders and is the latest in a rash of ransomware spotted by SlashNext Labs.   It is distributed through Russian Hacking forums and is marketed by its developers as Ransomware-as-a-Service or RaaS, allowing them to earn a small commission on each…

The Rise of Ransomware

March 10, 2016     2 Comments on The Rise of Ransomware     ,      admin

Hackers have found a new drug: ransomware. Ransomware encrypts data and then holds your files hostage until a ransom is paid.  Like all addictive drugs ransomware provides hackers with instant gratification, and it is also bringing them hefty profits. One of the great advantages of cloud computing is the ability…

Cognitive Thinking

February 27, 2016     No Comments on Cognitive Thinking          admin

Corporations have invested billions of dollars in “next gen” security devices built by some of the best minds in software today; but still, a handful of cyber threat actors – some of which have no college education – continue to hack their way into all types of organizations. The math…

Walls are not enough

February 23, 2016     No Comments on Walls are not enough          admin

Before the advent of gunpowder, castle or city walls were the primary means of defense.  The taller and thicker the wall, the longer a city or castle could stand against a siege.  The enemy eventually lost due to attrition.  Disease, starvation, and desertion reduced the enemy’s numbers until the threat…