<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Author Archives:Ofir Ashman

Recent Posts

Why Email Is Such a Dangerous Platform (And How to Protect Yourself)

Malicious emails are one of the cyber realm’s most widespread epidemics. Over 215 billion business and consumer emails are received daily, and with such an overwhelming flow of emails arises a very attractive opportunity for threat actors to easily penetrate victims’ online activity and lure them in to giving up credentials, downloading malware and more. According to the Symantec Internet Threat Security Report, one out of 412 emails contains a malware attack.

Although it seems as though cyber awareness is somewhat increasing due to the attempt to keep up with rapid advances in attack techniques, preying on human error continues to be extremely rewarding for threat actors. In retrospect, many email attack victims are dumbfounded when they realize that the email they so willingly acted upon is quite obviously suspicious upon second look. On top of that are highly thought out, sometimes tailored malicious emails, which do not even alert relatively cyber-aware people.

Read More

Share this:

Shlayer the MacOS Trojan Slays its Way into the New Year

While it does not boast any special or complex installation tactics, Shlayer’s distribution vector has made it a tremendous success - the malware has been the most prevalent MacOS strain since its debut two years ago, never falling off its leading spot. Shlayer uses a well-known infection tactic – pressing on a bad link directs the victim to a fake Adobe Flash update.

Read More

Share this:

Anonymous Hacker Discloses Critical Zero-Day vBulletin Exploit

A zero-day remote code execution vulnerability in vBulletin, an extremely popular internet forum software used on more than 100,000 websites, was discovered and exposed this week.

Read More

Share this:

ThreatSTOP Incorporates New File Sharing Services Target

ThreatSTOP is excited to announce a new curated target, TS Curated – File Sharing Services - Domains.

Cloud-based file sharing solutions have become popular and useful both for legitimate companies and for cyber criminals. Oftentimes, threat actors utilize file sharing services to host malicious files and as a destination for data they steal. Meanwhile, many companies depend on these file sharing services to get business done.

Read More

Share this:

ThreatSTOP Free Open Source Analysis Tools Series. Part 7: Analyzing APT 10 Use Case

Read More

Share this:

ThreatSTOP Free Open Source Analysis Tools Series. Part 6: Guildma Information Stealer Use Case

 

Earlier this month, a new variant of the Guildma information stealer was analyzed by the Internet Storm Center (ISC). The malware’s new campaign has been seen targeting various countries in South America, with the highest number of infections recorded in Brazil. It seems that Guildma is spreading quickly, with another recent campaign reaching over 150,000 infection attempts in a matter of weeks.

Read More

Share this:

ThreatSTOP Free Open Source Analysis Tools Series. Part 5: Emotet Banking Trojan Use Case

 

What was originally designed to be a banking Trojan has now become a versatile malicious code used to deploy a massive botnet, and is considered one of the most dangerous active malware families today.

In an alert published by the U.S. Department of Homeland Security last year, Emotet was described as “among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)." Emotet was extremely active in the first half of 2019, until a recent two-month period when the malware family went under the radar (rumor has it that the sudden disappearance was to allow for maintenance and upgrades). Last week, the malware re-emerged with renewed activity spotted by Cofense researchers.

Read More

Share this:

ThreatSTOP Free Open Source Analysis Tools Series. Part 4: Enrichments & Connecting the Dots

 

Making connections and finding new indicators is an important part of IOC analysis, and is probably the most enjoyable part as well. Blog posts and reports on new threats will usually mention the indicators seen to be used by the specific malware sample or attack vector analyzed, yet in many cases there is a larger malicious infrastructure behind them just waiting to be uncovered (and blocked!). Sometimes, a whole other malicious infrastructure can be revealed by examining IOCs related to malicious IPs and domains. There are a variety of tools out there that can help analysts investigate indicators of compromise and their infrastructure, and perform enrichment to shed light on related, malicious IOCs.

In this post, we will review some of our Security Research Team’s favorite connection and enrichment platforms.

 

Read More

Share this:

ThreatSTOP Free Open Source Analysis Tools Series. Part 3: Analyzing Threat Infrastructure

As mentioned in our previous post on IOC Collection and Sharing, analyzable indicators can be found on a variety of platforms and channels, each with its own level of reliability and information detail. Once an analyst has deemed the collected IOCs suspicious, they can review its background and infrastructure information, such as ASN and passive DNS for IPs, and Whois, resolving IPs, and popularity score for domains. In addition, the analyst can also check if leading security vendors have already deemed the IOC malicious by choosing from a wide array of open-source blacklists. At the end of this process, the analyst will have the information and knowledge required to decide if the inbound and/or outbound traffic to the indicator should be blocked.

In this post we will review free, open-source tools that analysts can use to collect technical and reputation information on IOCs, with a focus on IPs and domains.

Read More

Share this:

ThreatSTOP Free Open Source Analysis Tools Series. Part 2: Threat Exchanges & IOC Sharing

 

The first step in IOC analysis is obtaining the indicators to analyze. Some analysts will opt to stick with one source, and analyze whichever IOCs come their way, while others may search various sources for a specific threat type such as Ransomware, or threat such as Lokibot. Threat exchanges are open and free community platforms for information sharing and collaboration, and are an excellent source for IOCs. Another source for IOC collection which may come off as less intuitive is social media, with Twitter being the best SM platform to find new, relevant IOCs.

In this post, we will describe our Top 5 Free IOC Sources for Analysis.

 

Read More

Share this:

Home Page

ARCHIVES

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter