Tag: Latest threats

Snatch Ransomware Attack Detection

Ransomware continues to be one of the most serious threats to corporate networks, and Snatch ransomware is one of the most annoying “guests” that emerged relatively recently. The first infections were recorded about two years ago, but serious attacks on organizations began only in April 2019, and since then, the appetites and skills of the […]

Read More
Detection Content: WastedLocker Ransomware

The new WastedLocker ransomware was first spotted in May 2020. It was developed by the high-profile Evil Corp group, which previously used the Dridex trojan to deploy BitPaymer ransomware in attacks targeting government organizations and enterprises in the United States and Europe. Last year, part of the attackers left the group and started their own […]

Read More
Threat Hunting Content: Avaddon Ransomware Detection

A newcomer to the Ransomware scene, Avaddon Ransomware has been actively spread in spam campaigns since the beginning of the month, and the attackers behind it continue to recruit affiliates in underground forums. During one of the detected campaigns, cybercriminals sent over 300,000 malicious emails using Phorphiex/Trik Botnet. Currently, Avaddon is aimed more at individual […]

Read More
Zoom Service Hardening Guide

Intro   This is a practical guide based on Zoom and CheckPoint recommendations crafted with common sense and Zoom usage specific in our Company, aka work from home (WFH) activity as every company in the world now and sales / pre sales activities as a vendor.  Due to the specific nature of our business, in […]

Read More
COVID-19 | Coronavirus Phishing

Introduction COVID-19 / Coronavirus phishing is on the uptick and will likely remain a primary theme/lure for many months to come. This blog post makes recommendations as far as COVID-19 specific phishing and other threats brought on by increased teleworking.

Read More
Security Advisory. Bad Rabbit Ransomware worm.

The research is based on OSINT evidence analysis, local evidence, feedback from attack victims and MITRE ATT&CK methodology used for actor attribution. SOC Prime would like to express gratitude to independent security researchers and specialized security companies who shared the reverse engineering reports and attack analysis on the public sources and their corporate blogs. On […]

Read More