<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: malware

These Factors MUST Work For Every Successful Ransomware Attack. DNS is Always Involved.

A government agency that found itself infected with ransomware and having to pay the ransom to restore service. Another local agency has opted not to pay the ransom and restore operations. Ransomware targeted at organizations is still a threat and even with backups, you have a highly disruptive and public event to try to get back online that comes with serious costs and potentially lost revenue.

Read More

Share this:

Torii: The New IoT Botnet You Might Need to Start Worrying About

An extremely sophisticated IoT botnet has recently been discovered and dubbed “Torii.” One of Torii malware’s many advanced capabilities is running on just about every type of smartphone, computer and tablet, with over 100 malware variants supporting over 15 different architectures.

Read More

Share this:

John Bambenek Speaking at Infragard Symposium: A Primer on Cyber Security Intelligence & the Need For Threat Sharing

Read More

Share this:

Webcast with John Bambenek: Dangerous Lessons Learned from 2018's Healthcare Breaches

Read More

Share this:

Why Foreign Hackers Are Targeting Lawmakers' Personal Accounts

Sen. Ron Wyden (D-Ore.) on Capitol Hill in Washington on Dec. 19, 2017. (Carolyn Van Houten/The Washington Post)

Read More

Share this:

ThreatSTOP Introduces New Targets From Bambenek Consulting Feeds

Several new malware families have made recent appearances on the Bambenek Consulting feeds and are now tracked also by ThreatSTOP. These malware families are different in action and in their targets.

Read More

Share this:

ThreatSTOP Adds Nao_Sec Targets to Protect Against Drive-By Attacks

Nao_sec provides cyber security research dedicated to Exploit Kits. In campaigns that include Exploit Kits, landing pages with malicious code are used in an attempt to exploit a specific vulnerability on the victim's device.

Read More

Share this:

Xshell Ghost – All Ex Machina, None of the Deus

Certain versions of Xshell contain a backdoor that could allow for data exfiltration.

Read More

Share this:

ThreatSTOP Adding Point of Sale Malware Defense

Point of Sale (POS) malware is a growing field of concern for the retail industry. From the large scale attack on Target in 2014 to smaller attacks that are going unreported. POS malware is an evolving field of study for security researchers.

Read More

Share this:

CRBR Encryptor: A Ransomware By Any Other Name Would Encrypt as Well

It's not unusual for brands to occasionally have to re-envision themselves. Apparently this applies to legitimate and illicit brands equally.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter