Blog

Blog

Hacking the Human at BSides Philly: Social Engineering Basics

My talk at BSides Philly on December 3 is called "Hacking the Human: Social Engineering Basics," and it's about providing a social engineering foundation for people to adapt to their individual situation and needs. "Teach a man to fish" and all that, you know? Over the course of the talk I reference many thinkers, philosophers, psychologists, and...
Blog

The 5 Most Significant DDoS Attacks of 2016

On the cusp of 2017, one thing's clear: distributed denial-of-service (DDoS) attacks made their mark in 2016. Arbor Networks tracked 124,000 DDoS attacks each week between January 2015 and June 2016. Furthermore, 274 of the attacks observed in the first half of 2016 reached over 100 Gbps (as compared to 223 in all of 2015), while 46 attacks...
Blog

Cerber 5.0.1 Starts the Horrors of Christmas Ransomware

Christmas is around the corner, and cyber criminals are as restless as Santa’s dwarves. All big ransomware families are being updated on quite a regular basis, leaving users breathless and file-less. The Cerber ransomware family is an excellent example of a crypto family constantly being renewed. Cerber 5.0.1 is now making its rounds in the wild,...
Blog

Who Will Follow Facebook In Buying Customer Leaked Databases?

Facebook has taken the privacy of their customers seriously, as their Chief Security Officer (CSO) Alex Stamos has stated that the company has engaged in black market purchases of leaked or hacked databases that contain Facebook account credentials. A Preface To The Facebook Black Market Trade Facebook has publicly disclosed that it has bought...
Blog

What the Cloud Can Do to Improve IT Security

Cloud computing has come a long way in just a few years. Now, most businesses use some sort of cloud service, whether it be for a specific software application, infrastructure requirements, or more. The cloud certainly represents the way many companies are choosing to operate, but some have shown reluctance to adopt cloud solutions. One of the major...
Blog

TeleCrypt Ransomware Decryption Utility Released

Researchers have released a decryption utility that victims of TeleCrypt ransomware can use to restore access to their files. The Delphi-written trojan first reared its ugly head in the beginning of November 2016. Most crypto-ransomware samples communicate with their command-and-control (C&C) servers over HTTP-based protocols to send information...
Blog

Hacker Mindset: The Mystery of Cybersecurity Attribution

In my ongoing blog series “Hacker Mindset,” I explore an attacker's assumptions, methods and theories, including how information security professionals can apply this knowledge to increase cybervigilance on the systems and networks they steward. In this article, I examine attribution and its relation to information systems and crime. Methodology...
Blog

Women in Information Security: Jess Dodson

Women in information security are a fascinating group of people. I should know, being one myself. But being female in a quickly growing male-dominated industry poses its own challenges. And those of us who pursue security and IT in spite of gender stereotypes have unique strengths and insight. I first interviewed Tiberius Hefflin, a Scottish...
Blog

Malicious Image Distributing Nemucod Downloader to Facebook Users

A malicious image file is distributing the Nemucod malware downloader to unsuspecting users via Facebook chat. Threat intelligence analyst Bart Blaze heard about the malware campaign from a friend. They told him they had received a message on Facebook chat that contained only a Scalable Vector Graphics (SVG) file, which is an XML-based vector image...
Blog

Enter .Aesir - The Newest Variant of Locky Ransomware

Readers beware! The .Aesir Virus File Ransomware is becoming one of the biggest threats to your online security. We have recently become aware of a change in one of the most infamous cyber threats’ behavioral patterns. It would appear that the all-too-well known Locky ransomware virus has changed its format. Victims are now seeing their encrypted...
Blog

Could Technology Have Helped Prevent the Tesco Bank Breach?

A few well-known UK brands have hit the headlines recently as a result of a breach or security issue. For instance, Tesco Bank announced 40,000 customer accounts were affected by a “sophisticated” attack. Half of those had money taken from them. As a result, Tesco Bank could incur a severe penalty imposed by regulators. That fee would be in addition...
Blog

Boiler Room Share Scams: What Are They & How to Defend Against Them

Meet John. He's a 53-year-old accountant who owns property in New Zealand. He's also an experienced investor who likes to invest in New Zealand shares. As such, he understands how trading works, and he knows a good opportunity when he sees one. But there are some things you don't know about John. For starters, his first name isn't John. It's a...
Blog

New Android Spyware Found Using Former Hacking Team C&C Servers

Researchers have found a new Android spyware program that's using command and control (C&C) servers previously ran by Hacking Team. Team Red Naga came into contact with the spyware after someone contacted them about "advanced malware" that had infected one of their co-workers. Early on in their analysis, Team Red Naga didn't find anything...
Blog

Mark Zuckerberg has his Pinterest account hacked (again)

Facebook founder Mark Zuckerberg has had extraordinary success at building a social network that has attracted over a billion users. But that's not to say that he's had such luck in every other area of IT. Take securing his online accounts from attack, for instance. To misquote Oscar Wilde's "The Importance of being Earnest": "To lose control of...
Blog

Burgling From an OSINT Point of View

This is a more technology-based continuation of KGW Portland's story that it published discussing what 86 convicted burglars looked for in target selection. My aim is to add aspects of both Social Engineering and Open Source Intelligence (OSINT) into this to attempt to help raise awareness. The purpose behind the anonymous questionnaire, which was...