#onpatrol4malware Blog

 

Infosec Articles – June 2018

We've compiled a few of our favorite recent infosec articles for our blog readers. Keep reading to learn about a decryptor tool for Everbe ransomware, malicious code ADB.miner, and MysteryBot malware, which, frighteningly, combines a banking trojan, keylogger, and...

Infosec Articles – May 2018

A selection of our favorite infosec articles from May 2018. Cryptocurrency-mining makes its regularly scheduled appearance, and for some 'fun' reading, check out the SecureList article "History of malicious programs". There's a year-by-year breakdown of major security...

Be Smart – 419 Nigerian Email Scams

Nigerian Email Scams Malware Patrol's spam traps and honeypots capture messages and malicious URLs from all sorts of email scams and spam. One of the most well known is called the 419 or Nigerian scam. In 419 email scams, the sender suddenly contacts...

Why choose Malware Patrol over a free DNS protection service?

Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair, especially in a market that counts with, at least, 93 different offers of free DNS,...

Infosec Articles – March/April 2018

We are thankful that so many companies and individual researchers take the time to publish articles about the latest threats. And when they share IOCs, it's even better! We've put together some of our favorites from March and April 2018. Enjoy. DNS...

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)". Amazon Simple Storage Service has a simple web services interface that can...

Malware Patrol – Protection Against Crypto Mining Abuse

Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor's CPU for cryptocurrency mining purposes. While promoted as an alternative to online...

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating system. It happens with TCP SYN floods as well as UDP amplification and...

DDoS Reflection and Amplification Attacks

Reflection and amplification are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of publicly accessible UDP services to overload victims with response traffic....

Check Point Software and Malware Patrol Partner Up

FOR IMMEDIATE RELEASE Malware Patrol Announces Partnership with Check Point Software Technologies Brazilian security company joins forces with the world’s leading internet security firm. São Paulo, Brazil – June 13, 2016 – Malware Patrol is excited to announce its new...

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block lists and data feeds, and that this must be a mistake. It didn't take...

Role of DGAs in Malware and Ransomware Campaigns

The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to receive their instructions, such as which institutions to target, the...

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

Newsletter

Sign up to receive occasional updates and cyber security news.
 

Social Media