Emotet 101, stage 1: The spam lure

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:55:43 +0000

By SophosLabs Research Emotet operates on a mass scale. Everything it does, it does in bulk. A typical infection begins when the victim receives a specially crafted spam email. Emotet&#8217;s creators send these out by the thousands and, in some cases, the bots themselves send more. The lures employ mass-created malicious document files. The payload [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/7i2oOO4OT8A” height=”1″ width=”1″ alt=””/>

Read more

Ryuk ransomware attacks businesses over the holidays

Credit to Author: Adam Kujawa| Date: Tue, 08 Jan 2019 19:49:45 +0000

Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions unanswered. What do we know so far?

Categories:

Tags:

(Read more…)

The post Ryuk ransomware attacks businesses over the holidays appeared first on Malwarebytes Labs.

Read more

What’s in the spam mailbox this week?

Credit to Author: Christopher Boyd| Date: Tue, 31 Jul 2018 15:00:27 +0000

We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.

Categories:

Tags:

(Read more…)

The post What’s in the spam mailbox this week? appeared first on Malwarebytes Labs.

Read more

Spearphishers tool up for attack targeting builders

Credit to Author: Andrew Brandt| Date: Fri, 27 Jul 2018 06:01:24 +0000

A sophisticated spearphishing attack targets construction contractors in Boulder County, Colorado in the latest iteration of a months-long campaign.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jUtfsWaE0Zc” height=”1″ width=”1″ alt=””/>

Read more

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Credit to Author: Aniruddha Dolas| Date: Wed, 25 Jul 2018 13:40:33 +0000

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the start of 2017, we had seen the emotet campaign spreading through…

Read more

Five easy ways to recognize and dispose of malicious emails

Credit to Author: Pieter Arntz| Date: Tue, 19 Jun 2018 15:00:00 +0000

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Categories:

Tags:

(Read more…)

The post Five easy ways to recognize and dispose of malicious emails appeared first on Malwarebytes Labs.

Read more

Internet Shortcut used in Necurs malspam campaign

Credit to Author: Malwarebytes Labs| Date: Thu, 03 May 2018 17:44:18 +0000

The Necurs gang tries out a new trick to load malware and bypass security defenses.

Categories:

Tags:

(Read more…)

The post Internet Shortcut used in Necurs malspam campaign appeared first on Malwarebytes Labs.

Read more

Labs CTNT report shows shift in threat landscape to cryptomining

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Apr 2018 13:00:00 +0000

What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind.

Categories:

Tags:

(Read more…)

The post Labs CTNT report shows shift in threat landscape to cryptomining appeared first on Malwarebytes Labs.

Read more