<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Bi-Weekly Security Update 7/24/17

Malicious Content Identified and Inserted:

Read More

Share this:

Zloader/Terdot – That Man in the Middle

The ZeuS malware family was first seen in July 2007, and is the poster child for long-lasting bots. Zbot, one of the aliases of ZeuS, has a familial relation to Terdot. When ZeuS's source code leaked in 2011 bad actors jumped at the chance to start updating its capabilities based on their campaigns. One of these offspring was Terdot. MalwareBytes has made a study of the ZeuS family, and have noted a recent increase in Terdot/Zloader infections.

Read More

Share this:

Dynamic DNS Providers – Offering Options on IP Addresses

ThreatSTOP has compiled a list of Dynamic DNS (DynDNS) services and providers. The list itself can is useful for both black lists as well as white lists.

Read More

Share this:

El Machete Malware is Still "Sharp"

In the rapid cycle rise and disappearance of malware campaigns, there are only a few campaigns that last for several years. One of these, is the El Machete malware, which was first discovered by Kaspersky, and is thought to have been active since 2010.

Read More

Share this:

Magnitude EK: What's Shakin?

The Magnitude EK, active since 2013, is one of the longest-running exploit kits used, with many of its most recent victims coming from Asia. It is usually seen distributing Cerber ransomware.

Read More

Share this:

Winnti Aims to Win the Game

The Winnti group is a Chinese-linked cybercriminal group that is most well-known for its 2011 attacks against online video game producers.

Read More

Share this:

A Rough Time for Web-browsing: The RoughTed Campaign

One family of malware that even the most vigilant of users has to be careful of is malvertising. Malvertising's dangers come from the fact that malware infection can occur from visiting a common legitimate website, as the malware is embedded within the ads on the website, rather than the website itself.

Read More

Share this:

RIG Exploit Kit Takedown: Operation Shadowfall

Similar to Terror EK, the RIG EK gained a lot of footing in the EK market after the downfall of the Angler, Neutrino, and Nuclear exploit kits.

Read More

Share this:

BankBot and BankBotAlpha – Banking Android Malware

BankBot is a malware targeting Android OS, and has appeared in the Google Play Store in different forms, often impersonating well-known application icons or names.

Read More

Share this:

Bi-Weekly Security Update 7/7/2017

Read More

Share this:

WildFire Locker – Ransomware Disguised as Missed Delivery

Ransomware operators do not usually target specific victims as a source of money, but this campaign might change that.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter