Reports Threats

Posted on

“Zusy” PowerPoint Malware Spreads Without Needing Macros

By Caleb Fenton and Itai Liba, Senior Security Researchers, SentinelOne Labs A new variant of a malware called “Zusy” has been found in the wild spreading as a PowerPoint file attached to spam emails with titles like “Purchase Order #130527” and “Confirmation”. It’s interesting because it doesn’t require the user to enable macros to execute. […]

READ MORE
Posted on

The Anatomy of a DDoS Attack

Distributed denial of service or DDoS attacks are a big deal in today’s cybersecurity world. Time and time again, you’ll hear about a DDoS attack that took down a website or part of a company or government system. So what do these attacks do? What is a DDoS Attack? Behind the fancy name of “distributed […]

READ MORE
Posted on

NSA Hackers Release Last Cache of Stolen Hacking Tools

APTs aren’t exactly a regimented bunch. They spring up, release a list of breached credentials, merge with other groups, disappear, and then return under suspicious circumstances. This is all par for the course, which is why it’s no surprise that the APT group known as “The Shadow Brokers” have announced that they’re going dark for […]

READ MORE
Posted on

New Malware Threats: Ransomworm Is Coming, Are You Ready?

In 2016, there were over 4,000 ransomware attacks every day. This was a 300% increase over 2015, when there were 1,000 attacks every day, and it’s likely to get worse in 2017. In the first quarter of 2016, cyber criminals used ransomware to steal $209 million from US businesses with an expected $1B for the […]

READ MORE
Posted on

RaaS: Hacking Made Easy

Do you know what the greatest motivator in 2016 was for cyber attacks? If you answered “ransom,” you were correct. Known as the year of ransomware, a whopping 49% of businesses fell victim to cyber ransom attacks. Based on these numbers, IT professionals certainly have cause for concern. Especially when taking into consideration “hacking made […]

READ MORE
Posted on

Mobile Malware — The Market for Mobile Exploits Is Heating Up

Remember when Apple claimed that its products were immune to viruses and malware? This was most prevalent for OS X, but certainly bled into the “walled garden” of iOS. Meanwhile, the open Android operating system has been plagued by malware for years, but mostly in cases where users chose to jailbreak their devices. Now that […]

READ MORE
Posted on

Insider Threats in Cyber Security—More Than Just Human Error

If you consider the insider threats in cyber security (rather than dismissing everything as human error), you can cover the different types of human error. No matter how you look at it, companies can no longer afford to suffer such high volumes of insider threats on an annual basis. 3 Types of Insider Threats in […]

READ MORE
Posted on

Mirai Botnet Descendants Will Lead to Even Bigger Internet Outages

Hackers iterate constantly and at a frightening rate. Whenever a new piece of malware finds success, a million imitators and successors will pop up. The marketplace of ideas guarantees that the most successful of these variants will rapidly spawn offshoots of their own. We’ve seen this in the rise of ransomware, and now we will […]

READ MORE
Posted on

SentinelOne Discovers a New Delivery Tactic for BlackEnergy 3

We’ve recently detected a new distribution mechanism for BlackEnergy 3 that’s actively in use today affecting SCADA systems across Europe. BlackEnergy of course has been in existence since 2007, and has evolved significantly into a complete rootkit that can perform data exfiltration and network sniffing, among other tasks. In the following write up SentinelOne security […]

READ MORE