#onpatrol4malware Blog

 

Infosec Articles – September 2018

Read a few interesting CyberSecurity news articles from the past few weeks, including an update on a rootkit named CEIDPageLock being distributed by the RIG Exploit kit, Mozilla’s plan to distrust TLS certificates issued by Symantec, new MacOS malware, and more.

Infosec Articles – August 2018

A couple of updates on the Emotet trojan are among the highlights of our selected infosec articles from August 2018. Other important information includes Russian cyber attacks targeting U.S. critical infrastructure from the Department of Homeland Security and best...

Infosec Articles – July 2018

Our selected infosec articles July 2018 include an Android malware that targets Israeli soldiers through fake Facebook profiles, an updated Trojan that can infect via a cryptor or a miner, a money laundering ring that uses fake Apple accounts and gaming profiles to...

Infosec Articles – June 2018

We've compiled a few of our favorite recent infosec articles for our blog readers. Keep reading to learn about a decryptor tool for Everbe ransomware, malicious code ADB.miner, and mysterybot Android malware, which, frighteningly, combines a banking trojan, keylogger,...

Infosec Articles – May 2018

A selection of our favorite infosec articles from May 2018. Cryptocurrency-mining makes its regularly scheduled appearance, and for some 'fun' reading, check out the SecureList article "History of malicious programs". There's a year-by-year breakdown of major security...

Be Smart – 419 Nigerian Email Scams

Nigerian Email Scams Malware Patrol's spam traps and honeypots capture messages and malicious URLs from all sorts of email scams and spam. One of the most well known is called the 419 or Nigerian scam. In 419 email scams, the sender suddenly contacts...

Why choose Malware Patrol over a free DNS protection service?

Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair, especially in a market that counts with, at least, 93 different offers of free DNS,...

Infosec Articles – April 2018

We are thankful that so many companies and individual researchers take the time to publish articles about the latest threats. And when they share IOCs, it's even better! We've put together some of our favorites from March and April 2018. Enjoy. DNS...

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)". Amazon Simple Storage Service has a simple web services interface that can...

Malware Patrol – Protection Against Crypto Mining Abuse

Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor's CPU for cryptocurrency mining purposes. While promoted as an alternative to online...

RPZ – DNS Firewall Configuration Guide

BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ zone files (RPZ - DNS). Response Policy Zone (RPZ) enables DNS administrators to selectively block name resolution of Internet resources known to be used by cyber criminals....

Cisco ASA FirePOWER Configuration Guide

“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated approach combines best-in-class security technology with multilayer protection...

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and...

DDoS Reflection and Amplification Attacks

Reflection and amplification are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of publicly accessible UDP services to overload victims with response traffic. Attackers usually do...

Check Point Software and Malware Patrol Partner Up

FOR IMMEDIATE RELEASE Malware Patrol Announces Partnership with Check Point Software Technologies Brazilian security company joins forces with the world’s leading internet security firm. São Paulo, Brazil – June 13, 2016 – Malware Patrol is excited to announce its new...

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block lists and data feeds, and that this must be a mistake. It didn't take...

Role of DGAs in Malware and Ransomware Campaigns

The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to receive their instructions, such as which institutions to target, the...

pfBlockerNG Configuration Guide

Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block list, IP filtering, and country block functionalities. You can follow these simple steps to configure your pfBlockerNG to filter...

Newsletter

Sign up to receive occasional updates and cyber security news.
 
Newsletter - Sidebar


Social Media