Month: February 2018

Stealthphish investigation: 528 domains involved in BEC attack against Fortune 500 companies

About a week ago we got this info from one of our partners ā€œWe are seeing phishing emails flying in our environment (Internal to Internal)ā€ along with sharing an email sample with us. Today weā€™re going to analyze the recent phishing attacks targeted at Fortune 500 and Global 2000 companies dubbed ā€œStealthphishā€ aimed at compromising […]

Read More
Intel Issued New Updates to Mitigate Spectre Vulnerability

Delaware, USA ā€“ February 27, 2018 ā€“ Intel released new microcode updates to cope with vulnerability CVE-2017-5715 (Spectre Variant 2) for the Skylake, Kaby Lake and Coffee Lake processors, as well as for some other CPU lines. Updates for the other lines are still under development, for detailed information on the status of updates for […]

Read More
APT37 (Reaper) Enters the World Stage

Delaware, USA ā€“ February 22, 2018 ā€“ Known by numerous cyber espionage campaigns against South Korea, APT37 hacker group is spotted in attacks against organizations in the countries of the Middle East, Vietnam and Japan. Researchers from FireEye published a report linking the activities of this group with the government of North Korea. The researchers […]

Read More
SOC Prime Announces Threat Detection Marketplace

Delaware, USA ā€“ February 21, 2018 ā€“ SOC Prime, Inc. announces Threat Detection Marketplace, the first global cross-platform marketplace developed by security incident responders for fastest threat detection content delivery to CISOā€™s, SOC Managers and SOC Analysts. Threat Detection Marketplace provides actionable and relevant Use Cases to defend against cyber threats and to facilitate SOC […]

Read More
New RaaS Portal Offers Saturn Ransomware for Free

Delaware, USA ā€“ February 20, 2018 ā€“ Last week, researchers from MalwareHunterTeam discovered a new Saturn Ransomware. Methods of virus spreading are common for Ransomware: spam and malvertising campaigns. The amount of ransom payment for the decryption is about $300 in bitcoins, and the payment site is hidden in the Tor network. A few days […]

Read More
New Macro-less Technique for Infecting Users with Malware

Delaware, USA ā€“ February 16, 2018 ā€“ Attackers have adopted a new macro-less technique that allows them to deliver malware to the victim’s systems without causing suspicion and bypassing email gateways. Researchers at Trustwave discovered a spam campaign in which attackers used emails with attached Microsoft Word documents to initiate a four-stage process of delivering […]

Read More
HaoBao APT Campaign of Lazarus Group

Delaware, USA ā€“ February 15, 2018 ā€“ The infamous North Korean hacker group Lazarus performs a new APT campaign dubbed HaoBao. Analysts from McAfee ATR discovered a never-before-seen sample of malware, the analysis of which allowed them to link the attack with Lazarus group. The HaoBao campaign directed against large banks and cryptocurrency users. Attackers […]

Read More
0-day Flaw in Telegram was Used to Spread Malware

Delaware, USA ā€“ February 14, 2018 ā€“ Researchers from Kaspersky Lab discovered a zero-day vulnerability in the Windows client for Telegram software, which has been used by attackers for almost a year to infect users with malware. In October 2017, researchers spotted a vulnerability that allows attackers to perform a right-to-left override attack. Further investigation […]

Read More
Olympic Destroyer Malware was Used in Attack on Winter Olympics Opening Ceremony

Delaware, USA ā€“ February 13, 2018 ā€“ During the opening ceremony of the 2018 Winter Olympics, unknown threat actor performed a cyberattack on the event’s infrastructure. During the attack, hackers managed to shut down the Olympics website for 12 hours and also caused failures in the work of WiFi and digital television. Researchers from Cisco […]

Read More
SOC Prime Honored with Cybersecurity Excellence Awards

Delaware, USA ā€“ February 12, 2018 ā€“ SOC Prime, a fast-growing cybersecurity vendor, has been recognized as the winner at the annual Cybersecurity Excellence Awards and received two Bronze trophies. The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation, and leadership in information security. The winners of each nomination were determined based […]

Read More