<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Operation Emmental\SmsSecurity

The evolving threats targeted at mobile devices and the increasing number of campaigns targeted at financial institutions have joined forces and become a double threat in what have become known as the  The Emmental campaign. 

Read More

Share this:

Who Can You Trust? The Danger of False Positives in Threat Intelligence

Everyone knows you need to block the bad stuff from getting onto your network and calling home to its masters. However, what happens when something good gets incorrectly flagged as malicious? You’ve been hit with a false positive, and in some cases, this can be just as bad as letting something truly dangerous get through.

Read More

Share this:

ThreatSTOP security team is proud to present - Banking Malware Targets

Banking Malware steals millions of dollars from both personal and business accounts in the United States every year. Personal accounts are insured by federal banking regulations, but businesses are less protected.

Read More

Share this:

Nemucod spreads through Facebook messages

Read More

Share this:

Gooligan- The recent Hooligan that is spreading

One criteria for the success of malware is its scope of distribution. Gooligan, a mobile malware, found in the app SnapPea that is described as a "one-stop shopping experience", has succeeded in this aspect. Check Point reported that this malware has breached more than 1 Million Google accounts. This malware has been distributed through apps that are available in third party Android stores. In order to increase the number of downloads for these apps, and in turn the malware, there have also been phishing campaigns which contained download links, sent through various messaging services.

Read More

Share this:

New Phishing Protection

The ThreatSTOP Security Team has introduced a new list of Phishing protection in order to help our customers to protect themselves from Phishing and at the same time to maintain a separation between targets with different false positive chance.

Phishing is a technique used to gain private information for purposes of theft.

Read More

Share this:

Biweekly Security Update

Biweekly Security Update

Malicious content identified and inserted:

  • IPs – 232
  • Domains – 386

Target lists updated:

  • TS-CRIT
  • TS-RANS
Read More

Share this:

ANDROID MALWARE MARCHES AWAY WITH BANKING CREDENTIALS

Marcher is an evolving Android-based banking Trojan, changing in scope and capabilities since first seen in 2013. Spreading through phishing emails and websites, it prompts the victim to download “security updates” from third party app stores. It has also been found to spread through malicious apps on the Google Play Store itself.

Read More

Share this:

AVALANCHE

 

On November 30th, 2016, a worldwide cooperative takedown of the Avalanche botnet took place after more than four years of investigation.  “Avalanche” refers to a worldwide crimeware-as-a-service (CaaS) network infrastructure operated by cyber criminals conducting malicious activity. This includes: DDoS, malware distribution, phishing and money-mule operations causing hundreds of millions of damages in Euros worldwide.

Read More

Share this:

RELEASE NOTES & SECURITY UPDATE – 12/14/2016

4.12 Release Notes

Reporting – The Legacy reporting link has been removed from the portal. All Legacy reporting information is available in the Next-Generation reporting UI.

 12.14 .16 Security Update

Malicious Content Identified & Inserted:

  • IPs – 166
  • Domains – 1288

Target Lists Updated:

  • TS-CRIT
  • TS-RANS
Read More

Share this:

ThreatSTOP 4.10 Release Notes

ThreatSTOP 4.10 Release Includes:

 

Read More

Share this:

Houdini's RAT Is No Disappearing Act

Most creators of Trojans or worms only known attribution to their creation is made by security researchers, and although, these individuals are not known in person, some of them are known and active in the cybercriminal scene. One of these “celebrity cyber criminals” is known by his alias Houdini, and according to Threatgeek.com is named 'Mohamed Benabdellah'. Houdini is believed to be based in  Algeria and connected to njq8” (aka ‘Naser Al Mutairi’) the developer of other RATs as "njRAT" and "njw0rm".

Read More

Share this:

DGAs For the Masses

At ThreatSTOP, we strive to provide our customers with the most up-to-date and accurate protection from both known and emerging threats. Using the data provided by our friends at the Qihoo 360 research team we have constructed a target list of over 20 identified malware families. The malware families that we will be protecting you against are:

Read More

Share this: