MENUMenuIcon OUR STORY

SLASHNEXT LABS

THE KNOWLEDGE CENTER

BLOG

VIEW CATEGORIESHIDE CATEGORIES
SlashNext Labs SlashNext Labs

Technical Support Scam Making Auto Calls

Phishing, Social Engineering Attacks

Technical support scams use scare tactics to trick gullible victims into believing that their computer has either crashed or that a virus has been detected on their computer. These scams try to lure victims into calling a fake technical support hotline which, if successful, can lead to telephone fraud. The goal is usually gaining remote access …

February 12th 2018

Icon Read More
SlashNext Labs SlashNext Labs

­Kovter – Stealthy Zero-Day Variant

Malware

Kovter is seven years old trojan horse that started as ransomware tool, and then evolved into a full-fledged click fraud Trojan. During this evolution Kovter has changed its attack techniques, but its payload delivery methodology remained unchanged. Initially it was spread as ransomware via exploit kits to hide its activities. In 2014 Kovter became very …

February 7th 2018

Icon Read More
Jack Miller Jack Miller

What is in the toolbox?

General

In my previous blog post, I told you a little bit about my perspective on the current state of IT security based on almost 20 years’ experience as a CISO. Now, let’s look at the most frequently recommended approaches to addressing ongoing problems. For many years, security vendors have told us that there are two …

February 6th 2018

Icon Read More
SlashNext Labs SlashNext Labs

GandCrab – The First Ransomware that Accepts only DashCoin

Ransomware

A new ransomware attack called “GandCrab” emerged last week, which has surprisingly distinct features such as only accepting ransom payment from the anonymous crypto currency ‘DASH’ and employing a “dot bit” (.bit) top level domain served by Namecoin’s distributed blockchain-based DNS infrastructure. Like other ransomwares we have observed, the GandCrab’s campaign is leveraging the Seamless …

February 2nd 2018

Icon Read More
SlashNext Labs SlashNext Labs

Why Demand Ransom When You Can Crypto Mine?

Malware

Since the onset of malware, the ability to make money by attacking companies has become a lucrative business. As attacks became more and more prevalent, enterprises invested more in protecting themselves. They hired and trained threat researchers, and as more sophisticated tools were developed they were quickly adopted to protect the enterprise. Like any other …

January 29th 2018

Icon Read More