Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/18 Spam Campaign Uses Recent Boeing 737 Max Crashes to Push Malware The email goes on to discuss how the Berlinger persona found a document leaked on the dark web. This file purports to identify several companies that will suffer similar crashes involving Boeing 737 Max aircraft in the future. Under the guise of helping them protect their loved ones, Berlinger asks users to view the document by opening an attached JAR file named “MP4_142019.jar.” http://bit.ly/2TexeuY This New... read more.

  • March 22, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/11 Windows malware: Slub taps Slack, GitHub to steal your info The malware also exploits an even older Windows bug, CVE-2015-1705, a win32k.sys local elevation of privilege flaw that was found to be useful by targeted attackers because it could be used to bypass a Windows application's sandbox. Once a machine has been fully compromised, the backdoor uses a private Slack channel to check commands taken from 'gist' snippets hosted on GitHub, and then sends the commands to a private Slack channel co... read more.

  • March 15, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 3/5 Attack Campaign Targets Organizations Worldwide with New Qbot Banking Malware Variant The campaign consists of phishing emails that come with an attached ZIP file using a .doc.vbs extension. Upon execution, the VBS script extracts information about the target machine’s operating system and attempts to check for strings associated with well-known antivirus software. It then uses the BITSAdmin tool to run a malware loader. https://ibm.co/2XEb6xF Ivanti Brings Together Leading Patch Manag... read more.

  • March 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/25 Phishing campaign attempts to spread a new brand of snooping malware A series of spear-phishing attacks using fake emails with malicious attachments attempts to deliver a new family of malware, which researchers at Palo Alto Networks have identified and dubbed BabyShark. The campaign started in November and remained active at least into the new year. https://zd.net/2U4F3Vq Cisco HyperFlex Software Command Injection Vulnerability A vulnerability in the cluster service manager of Cisco HyperF... read more.

  • March 05, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/18 Symantec Improves Email Security With Fraud Protection Jane Wong, vice president of Engineering and Product Management, explained that Symantec Email Security protects customers from email attacks by blocking threats such as phishing, malware, spam and BEC; Email Fraud Protection helps customers automate implementation of sender authentication standards such as DMARC, DKIM and SPF.  http://bit.ly/2EhPmQK Detected Cryptojacking Prompts Microsoft to Remove Eight Free Apps from Micros... read more.

  • February 22, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/11 Microsoft: Improved Security features are delaying hackers form attacking Windows users New features have made it much harder for mundane cybercrime operations to come up with zero-days or reliable exploits for newly patched Microsoft bugs, reducing the number of vulnerabilities exploited at scale. https://zd.net/2WVMQXq Citrix Cloud comes to Cisco HyperFlex Customers who want to take advantage of the benefits of moving the Citrix control plane to the cloud and have Citrix manage the enviro... read more.

  • February 15, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/4 Google Yanks 29 Malicious Photo Apps From Play Store, But Not Before Millions of Downloads Google yanked some 29 photo apps from the Play Store this week after they were discovered to have malicious code that pushes full-screen ads, steals information from users by tricking them into believing they have won a contest, and in some cases even lifted photos from devices to send to the malware designers behind the apps. http://bit.ly/2WIdwuz This password-stealing phishing attack comes disguised... read more.

  • February 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/28 This Trojan infects Chrome browser extensions, spoofs searches to steal cryptocurrency The main thrust of the malware is its capability to steal cryptocurrency. Razy focuses on compromising browsers, including Google Chrome, Mozilla Firefox, and Yandex. Different infection vectors are in place depending on the type of browser found on an infected system. https://zd.net/2COMgBC Bypassing Network Restrictions Through RDP Tunneling FireEye has observed threat actors using native Windows RDP ut... read more.

  • February 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/21 Malware Evades Detection One Step at a Time The apps were reportedly able to evade detection by using the device's motion sensor data. The malware authors assume that the device is scanning for malware, so they created an emulator with no motion sensors that monitors the user’s steps so that they check for sensor data to determine whether the app is running in a sandbox environment. If it is, the malicious code does not run. If it does run, though, the user receives a fraudulent prompt,... read more.

  • January 25, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/14 FireEye gears up email security for emerging threats Business email compromise (BEC), which is often cited as the most common way for cyber criminals to infiltrate corporate networks, is a type of scam that targets email accounts of high-level employees related to finance or working with wire transfer payments, either spoofing or compromising them through keyloggers or phishing attacks. http://bit.ly/2M9Dm5V Cryptocurrency mining malware is the number one malware menace – again Crypto... read more.

  • January 18, 2019