Finally, some relief from the Windows updates process that has annoyed users the world over for years! We’re seeing new tricks used by old malware and vice versa; ex. Emotet intercepting email conversations and injecting malware links.
For more articles, check out our #onpatrol4malware blog.
Mapping Out a Malware Distribution Network
More than a dozen US-based web servers were used to host 10 malware families, distributed through mass phishing campaigns. Malware families include Dridex, GandCrab, Neutrino, IcedID and others. Read more.
The Evolution of Phishing Kits
Gone are the days when a phishing page was a single page designed to capture user credentials. Phishing kits have become sophisticated and advanced to evade detection and look more legitimate to the user. Read more.
Source: Security Soup
Emotet continues to be among the most widely distributed and destructive malware variants affecting organizations throughout the private and public sectors. Read more.
Abuse of hidden “well-known” directory in HTTPS sites
In this blog, we are focusing on the Shade/Troldesh ransomware and phishing pages that we detected last month from several hundred compromised CMS sites. Read more.
MAR-10135536-8 – North Korean Trojan: HOPLIGHT
Working with U.S. Government partners, DHS and FBI identified Trojan malware variants used by the North Korean government. This malware variant has been identified as HOPLIGHT. Read more.
Emotet hijacks email conversation threads to insert links to malware
The group has been spotted this week reviving old email conversation threads and injecting links to malicious files. Read more.
The Nasty List Phishing Scam is Sweeping Through Instagram
A new phishing scam called the “The Nasty List” is sweeping through Instagram and is targeting victim’s login credentials. Read more.