Latest Intelligence for January 2017

The email malware rate drops due to Necurs botnet inactivity and the Angler exploit kit makes a surprise comeback. Twitter Card Style:  summary Some of the key takeaways from January’s Latest Intelligence, and the threat landscape in general, include a lull in activity from the Necurs botnet affecting the email malware rate, the return of…

Read More

Latest Intelligence for January 2017

The email malware rate drops due to Necurs botnet inactivity and two new Android malware families appeared. Blog Feature Image:  intelligence.jpg Twitter Card Style:  summary Some of the key takeaways from January’s Latest Intelligence, and the threat landscape in general, include a lull in activity from the Necurs botnet affecting the email malware rate, new…

Read More

Android ransomware repurposes old dropper techniques

Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand. Twitter Card Style:  summary Android.Lockdroid.E has been seen using a dropper technique to drop a version of itself on rooted Android devices. While this is not an uncommon technique, this is the first…

Read More

Android ransomware repurposes old dropper techniques

Android ransomware is now using dropper techniques to drop malware on rooted devices as well as an inefficient 2D barcode ransom demand. Blog Feature Image:  phone-alert.jpg Twitter Card Style:  summary Android.Lockdroid.E has been seen using a dropper technique to drop a version of itself on rooted Android devices. While this is not an uncommon technique,…

Read More

Android ad malware on Google Play combines three deception techniques

Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user's knowledge. Twitter Card Style:  summary Contributor: Martin Zhang Summary: Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated…

Read More

Android ad malware on Google Play combines three deception techniques

Three apps on Google Play use delayed attacks, self-naming tricks, and an attack list dictated by a command and control server to click on ads in the background without the user's knowledge. Blog Feature Image:  EB-generic-tablet.jpeg Twitter Card Style:  summary Contributor: Martin Zhang Summary: Three apps on Google Play use delayed attacks, self-naming tricks, and…

Read More

Greenbug cyberespionage group targeting Middle East, possible links to Shamoon

Greenbug may answer the question of how Shamoon obtains the stolen credentials needed to carry out its disk-wiping attacks. Twitter Card Style:  summary Symantec is currently investigating reports of yet another new attack in the Middle East involving the destructive disk-wiping malware used by the Shamoon group (W32.Disttrack, W32.Disttrack.B). Click to Tweet:  Is there a…

Read More

Greenbug cyberespionage group targeting Middle East, possible links to Shamoon

Greenbug may answer the question of how Shamoon obtains the stolen credentials needed to carry out its disk-wiping attacks. Twitter Card Style:  summary Symantec is currently investigating reports of yet another new attack in the Middle East involving the destructive disk-wiping malware used by the Shamoon group (W32.Disttrack, W32.Disttrack.B). Click to Tweet:  Is there a…

Read More

Microsoft Patch Tuesday – January 2017

This month the vendor has released four bulletins, one of which is rated Critical. Twitter Card Style:  summary Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor has released four bulletins, one of which is rated Critical. As always, customers are advised to follow these security best practices: read…

Read More

Microsoft Patch Tuesday – January 2017

This month the vendor has released 4 bulletins, one of which is rated Critical. Twitter Card Style:  summary Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor has released 4 bulletins, one of which is rated Critical. As always, customers are advised to follow these security best practices: read…

Read More