<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: information-security

Analysis: New Android Malware Steals Victim Data From 300+ Apps

 

A new android malware strain was uncovered in May, boasting the ability to steal data from 337 applications, including passwords and credit card information. Among these apps are some of the most highly-used applications on any android phone, such as Netflix, Gmail, Amazon, Uber, and more.

Read More

Share this:

Learning from the Honda Ransomware Attack

 

The Japanese manufacturing giant revealed that it had been hit with ransomware on Monday June 8, 2020, forcing it to shut down a number of manufacturing facilities and disrupting its global operations. Honda was left with no choice but to halt operations in Japan, North America, the U.K., Turkey and Italy. Furthermore, the ransomware attack caused disruptions to the company’s customer service and financial services.

Read More

Share this:

US Secret Service Warns Surge in Ransomware Attacks Targeting MSPs

 

Managed Service Providers (MSPs) seem to be a huge target for ransomware lately. MSPs in both government and the private sector have been under attack, causing the U.S. Secret Service to issue a special warning about this phenomenon.

Read More

Share this:

How to Work Towards Better Whitelisting

 

One of the key problems in threat intelligence is curating whitelists of infrastructure and domains that should never be blocked. Just recently, a government CERT distributed lists of IoCs that included private IP addresses that just are not useful for analysts and hunt teams. At best, it creates wasted time and effort. At worst, key infrastructure is blocked and there is business impact and/or loss of revenue.

Read More

Share this:

Announcing ThreatSTOP 6.0 Featuring Role Based Access Control

 

So much about good, basic Security comes down to proper access control. Information security, physical security, personal security, (probably even financial security?) – all security, it seems, works better when there’s proper control over who has access to what and when.

ThreatSTOP’s platform has historically allowed two levels of user access: Admin and Reporter. In this simple scheme, Admins could access everything, like creating a custom DNS Firewall policy, or whitelisting an IP across all their firewalls, while lowly Reporters got read-only access to look at reports. Two extremes of access control for what was a simpler time.

In the years since, things have really evolved in Security. It's gotten scarier outside – there are more threats, nastier ones, more sophisticated attackers, and shrewder methods. DDoS for hire, and turn-key ransomware. The myth of companies “too big to take down” or “too small to be targeted” got busted. It has gotten crazy out there.

Read More

Share this:

Infographic: The Most Infamous Botnets of the 21st Century

Botnets are a unique type of threat. The colossal power that networks of millions of compromised computers can reach allows botnets to do a lot of damage, from generating and stealing large sums of money to deploying dangerous attacks. Last year saw a 71.5% increase in botnets as opposed to 2018, further showing that botnets are a worthwhile business for attackers, and a prevalent threat to watch out for.

These malicious networks have been around since the very end of the 90’s, rapidly evolving and becoming more advanced, year by year. Our new infographic examines the most prevalent, well-known botnets from the beginning of the century up until today, shedding light on the diverse landscape and evolution of this fascinating threat.

Read More

Share this:

Are Cyber Attackers Hacking Your Webcam?

 

What Is Camfecting?

Camfecting is the act of accessing a victim’s webcam and operating it without permission. This is usually done by infecting the camera owner’s device with malware, which then gains access to the webcam and controls it via remote access.

The thought that a stranger may be peeping at us while we are near our computers is unsettling at the least. Now, with much of the employed workforce working from home due to the global Covid-19 epidemic, we can only imagine the breach of privacy that may happen as the result of a hacked webcam. In addition to the potential loss of privacy, attackers could record victims and use the footage for blackmail or to collect ransom. Webcam hackers can also use the camera to monitor the victim’s home to learn when it is vacant.

Read More

Share this:

Watch Out for THIS Malicious Gift Card

 

When people imagine threat actors tricking victims into installing malware, the first thing that comes to mind is probably email phishing or typosquatted domains. These days, digital attack vectors are so easy to deploy that physical vectors may even get a chance to fly under the radar.

In a recent campaign uncovered by Trustwave, the criminal threat group FIN7 mailed USB drives serving an unknown malware strain disguised as a free Best Buy gift card offering. The letter mailed with the USB drive states that the retail giant is sending out gift cards to its loyal customers, and the gifted credit can be used to buy products from a specific list that is found on the enclosed USB stick.

Read More

Share this:

A Special Message to CrowdStrike MyDNS Users

In the coming days, CrowdStrike will formally end-of-life their DNS service that many customers are using. This service takes Crowdstrike intelligence and puts it into a CrowdStrike-managed DNS resolver to protect against advanced threats that they are tracking. When this service is retired, you will no longer have protection at that layer. As an important note, there are many classes of devices that endpoint protection do not work on (medical devices, IoT, etc) but by using DNS, you can still provide a strong layer of protection.

Read More

Share this:

ThreatSTOP Premium Feed Spotlight Series: Level Up Your Malvertising Protection with The Media Trust Premium Threat Intelligence Feed

Most malware is often delivered from otherwise legitimate sites. Sometimes this occurs via compromising existing websites, but more often than not, it is by using existing advertising networks as a means to ultimately deliver malware. Quite simply, the attacker buys impressions via existing channels and uses a variety of malvertising tricks to either directly compromise the web browser, or at the least trick the user to installing the malware. This specialized form of malware delivery requires a specialized collection methodology to detect such attacks.

Read More

Share this:

Home Page

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter