Trojan Droppers Exploiting Symbolic Link Files Malicious actors routinely attempt to confuse recipients of messages with obscure file extensions to load malicious files on the victims machine. For most users the .slk file is recognized in Microsoft Office software as an Excel file. However, as detailed here, it also is recognized by other applications among […]

Email Bombs Increasing in Frequency Email bombs in the cyber-security industry are classified as a form of a Denial of Service (DoS) attack. The victim faces an insurmountable volume of messages quickly filling up their mailbox when this attack commences. With enough volume, this effectively renders their email box useless. Victims attempt to make sense […]

****Update: 12/29/2017 9 A.M.**** Necurs botnet operators continue to show unpredictability. Following the afternoon blog update yesterday they turned up the volume.  It ended up being our highest volume day of the year originating from the massive botnet.  We blocked 49,784,485 million ransomware messages destined to customers.                   […]

Move over macros, Office DDE exploits arrive! Office macros have been the primary choice of attacks by malicious actors for years.  IT administrators and users have learned to be cautious before running macros. The Dynamic Data Exchange (DDE) protocol has been around much longer but hadn’t been used for attacks.  It’s a communication protocol that […]