MENUMenuIcon OUR STORY

SLASHNEXT LABS

THE KNOWLEDGE CENTER

BLOG

VIEW CATEGORIESHIDE CATEGORIES
Icon admin

Yahoo Email Phishing through Data URI

General, Phishing

Hackers have come up with new and innovative way to perform credential phishing attacks. Typical credential phishing is done by creating look-a-like web pages hosted on compromised web servers or servers owned by the attacker himself. The problem for an attacker is that eventually signature based technologies catch up and black list these pages. Attackers have found …

March 6th 2017

Icon Read More
Icon admin

Inside a Phishing Network

Breaches, General, Phishing

Credential Phishing is an effective way to snatch someone’s confidential information.  Hacker’s create a look-a-like login page matching a global brand’s login (Google, Yahoo, Microsoft) and send a phishing email containing a link to the fake page. When a victim clicks on the phishing link, the fake page (which exactly resembles the brand’s login page) is …

February 12th 2017

Icon Read More
Icon admin

Jigsaw Ransomware

Malware, Ransomware

Jigsaw is the latest in a spate of Ransomware that encrypts files and offers to sell the victim a decryption key to get their data back.  Adding a new twist, Jigsaw threatens to delete one file every hour if the ransom is not paid in a timely manner. Jigsaw is capable of encrypting files that …

April 16th 2016

Icon Read More
Icon admin

PowerWare – A malware built on lies

Malware, Ransomware

A couple of weeks ago the folks at Carbon Black discovered a new Ransomware strain that they dubbed “PowerWare”. What makes PowerWare interesting is its ability to encrypt files using the Windows PowerShell scripting language.  Unlike other Ransomware, Powerware doesn’t need to install a binary on the infected machine. When enabled, Macros inside a weaponized …

April 4th 2016

Icon Read More
Icon admin

Mighty TeslaCrypt

Malware, Ransomware

Ransomware is not a new concept. Some early examples such as GpCode spread as early as 2006, but the recent surge of new highly advanced Ransomware is like nothing the world has ever seen. Most of what we see today can be traced back to CryptoLocker and CryptoWall.  These two ransomeware alone have netted their …

March 26th 2016

Icon Read More