Breaking Down the Latest O365 Phishing Techniques

Breaking Down the Latest O365 Phishing Techniques

|
Microsoft Office 365 phish are some of the most common threats that reach end users inboxes. Over the course of a two-year period, PhishLabs has observed that O365 phish have accounted for more than half of all reported phish by enterprises - by a significant margin.  ... Read More
Surge in ZLoader Attacks Observed

Surge in ZLoader Attacks Observed

| | banking trojan, Ransomware
PhishLabs has observed a spike in malicious emails distributing ZLoader malware. The spike is notably one of the greatest upticks for a single payload observed in a 24-hour period over the past year, and is the first significant sign that another botnet may be stepping up in the aftermath of ... Read More
Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In

Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In

| | Malware, Ransomware
Recently, we published a piece highlighting early stage loaders often used in ransomware attacks. One of the most prolific was Emotet, which has since been taken down via a coordinated, multi-national effort. How will this impact the threat landscape? In this post, we take a look at loader activity in ... Read More
Threat Actor using Social Media to Scam Credit Union Members

Threat Actor using Social Media to Scam Credit Union Members

| | Social Media Threats
Recently, PhishLabs mitigated an attack using a fake social media page to steal the credentials of a credit union (CU) customer. The below demonstrates how the attack was executed ... Read More
Sharp Increase in Emotet, Ransomware Droppers

Sharp Increase in Emotet, Ransomware Droppers

| | Ransomware
Ransomware continues to be one of the most  impactful threats to enterprises. Aside from external vulnerabilities, its primary delivery method remains email phishing, with links or attachments containing early stage loaders. These loaders initiate attacks by compromising systems and installing additional malware. PhishLabs has analyzed these early stage loaders and ... Read More
Activists Leak Data Stolen in Ransomware Attacks

Activists Leak Data Stolen in Ransomware Attacks

|
The activist group known as Distributed Denial of Secrets (DDoSecrets) has published almost one terabyte of data originally leaked to dark web sites by ransomware operators. In addition, they are privately making another 1.9 terabytes of stolen data available to journalists or academic researchers.  ... Read More
Year In Review: Ransomware

Year In Review: Ransomware

| | Ransomware
In 2020, cybercrime has seen a dramatic evolution in ransomware attacks. This threat type has adopted increasingly malevolent tactics and targeted some of the year's most vulnerable industries. Operators are linking up, franchising their attacks, extorting their victims, then expecting organizations to believe them trustworthy. By 2021, ransomware is anticipated ... Read More
APWG Q3 Report: Four Out of Five Criminals Prefer HTTPS

APWG Q3 Report: Four Out of Five Criminals Prefer HTTPS

The Anti-Phishing Working Group (APWG), known for its collaborative analysis of phishing attacks and identify theft techniques, has released its Phishing Activity Trends Report for Q3 of 2020. Highlights from the report include more than two hundred thousand unique phishing websites detected in August and September, SSL encryption for phishing ... Read More
Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

Impersonation enables threat actors to manipulate victims into disclosing sensitive information as well as enhance their ability to commit fraud. An organization's name, logo, or messaging can be incorporated into almost any threat type, making it an easy and versatile element of a cyber attack. Impersonation is an especially difficult ... Read More
Ransomware Groups Break Promises, Leak Data Anyway

Ransomware Groups Break Promises, Leak Data Anyway

While paying ransoms to cybercriminals remains very controversial, the trend of ransomware groups threatening to leak sensitive data has added another layer of complexity to an already difficult decision. Should organizations pay up? Or should they refuse?  According to a recent report, it may not matter. Data stolen in ransomware ... Read More
Loading...