CATEGORY ARCHIVES: malware

Locky Back in Action

Locky, the infamous ransomware plaguing computers worldwide since it was first seen early last year, has recently made a comeback after a severe drop in activity over the holiday season. The Necurs botnet, which is Locky's primary distributor, was offline for the final weeks of 2016, equating to an 81% decrease in the number of Locky attacks.

Share this:

CryptXXX Ransomware Spread Through SoakSoak Botnet: Two Big Actors As One

CryptXXX and SoakSoak are huge threats individually.

Share this:

Bi-weekly Security Update

Bi-weekly Security Update

Malicious content identified and inserted:

  • IPs – 960
  • Domains – 1653

Share this:

How much would you pay in bitcoin to watch that cat video?

Where do security professionals draw the line between protecting their company’s network, and delivering a free-range internet experience for their fellow employees? This quandary came up at ThreatSTOP recently, spurred by a support request we received from a customer who posed this very question to himself, his peers, and to us. It got us thinking, and made us wonder what the consensus is among security professionals who constantly wrestle with balancing the scales of security and user friction.

Share this:

Bi-weekly Security Update 12/21-1/3

Malicious content identified and inserted:

  • IPs – 1625
  • Domains – 4562

Target lists updated:

  • TSCritical (Domains and IPs)
  • TSRansomware (Domains and IPs)
  • TSPhishing (Domains and IPs) – New Targets added!
  • TSBanking (Domains and IPs) – New Targets added!

Share this:

Biweekly Security Update

Biweekly Security Update

Malicious content identified and inserted:

  • IPs – 232
  • Domains – 386

Target lists updated:

  • TS-CRIT
  • TS-RANS

Share this:

AVALANCHE

 

On November 30th, 2016, a worldwide cooperative takedown of the Avalanche botnet took place after more than four years of investigation.  “Avalanche” refers to a worldwide crimeware-as-a-service (CaaS) network infrastructure operated by cyber criminals conducting malicious activity. This includes: DDoS, malware distribution, phishing and money-mule operations causing hundreds of millions of damages in Euros worldwide.

Share this:

Next Gen IP Firewall Reporting Video - Check it out!

[wpvideo bpjKUiwj]

Share this:

Panda Banker - Expanding coverage

The Panda Banker banking Trojan, recently uncovered by Fox IT, is related to one of the most famous and destructive banking Trojans in history, Zeus. The Panda Banker is designed to collect victim's login information and online banking credentials and is currently being used to target banking customers in the United Kingdom and Australia. Like its predecessor, the Panda Banker integrates more advanced persistence, infection strategies and modules, which makes the Panda Banker a considerable threat to its victims.

Share this:

FBI Pays $1 million to ??? to Crack iPhone

The Washington Post reported today that the FBI paid a one-time fee of $1 million to hackers to crack the San Bernardino shooter's phone. The article goes on to say that authorities have not revealed the identity of the hackers.

Share this: