****Update: 12/29/2017 9 A.M.****
Necurs botnet operators continue to show unpredictability. Following the afternoon blog update yesterday they turned up the volume. It ended up being our highest volume day of the year originating from the massive botnet. We blocked 49,784,485 million ransomware messages destined to...Read More
Mecklenburg County in North Carolina has no patience for cyberattacks. And they proved that when they recently refused to pay $23,000 in ransomware.Read More
2017 was definitely not a quiet year when it came to cybercrime.Read More
On this week's episode, CSO's Salted Hash security writer Steve Ragan talks with CSO's Michael Nadeau to talk about things that keep IT administrators awake at night. Hint: Ransomware is not the only thing.
The items in the episode were pitched to CSO by AppRiver. The data in the list was sourced from working security...Read More
Tis the season ... and hackers are not taking a break. Already we are starting to see emails targeting online shoppers.
Taking advantage of all those online sales also means waiting for and tracking your packages to make sure they arrive safe and sound on your doorstep. And that is exactly what hackers are counting on. Be...Read More
This morning we began seeing a large volume of messages that ultimately lead to the install of the “Asasin” ransomware, aptly named after the naming convention used when encrypting the user’s files. We have been seeing this Ransomware type for about a week now but it is now relying on a new infection technique.Read More
***UPDATE*** In the past 24 hours we have seen over 23 million messages sent in this attack, making it one of the largest malware campaigns that we have seen in the latter half of 2017.
Malicious email campaign
As many US workers were arriving to their offices, a massive malicious email campaign began attempting to reach...Read More
Attack Overview and Statistics
SANS Institute conducted a survey on how attackers were able to compromise user devices. They found 74 percent entered via an email attachment or email links, 48 percent from web based drive-by or download, and 30 percent through application vulnerabilities. Phishing (72 percent), spyware...Read More
Cybercriminals are nothing if not persistent. Part of that persistence comes in the form of reoccurring themes.
One of the most popular social engineering themes utilized in malware distribution over the past decade have come in the form of phony emails posing as a parcel delivery notifications. Think UPS, FEDEX, DHL or...Read More