Attacks on industrial enterprises using RMS and TeamViewer
Main facts Kaspersky Lab ICS CERT has identified a new wave of phishing emails with malicious attachments targeting primarily companies and organizations that are, in one way or another, associated with industrial production. The phishing emails are disguised as legitimate commercial offers and are sent mainly to industrial companies located in Russia. The content of […] more…Organizations Leave Backdoors Open to Cheap Remote Desktop Protocol Attacks
Thanks to my colleague Christiaan Beek for his advice and contributions. While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access linked to security and building automation systems of a major international airport could be bought for only US$10. The dark web contains RDP shops, online platforms selling remote desktop […] more…Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?
It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s passion for playing video games. He loved them, and I let him. I convinced myself that my son’s video gaming provided him with an instant community where he daily climbed to the top of the […] more…Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site
by Jindrich Karasek and Loseway Lu The practicality of cryptocurrency mining on devices connected to the internet of things (IoT) is often a questionable matter in terms of computing power. Be that as it may, we’ve nonetheless seen miscreants targeting connected devices and even offering cryptocurrency malware in the underground. Our honeypot sensors, which are […] more…How One Healthcare Company Implements DLP to Protect PII and PHI
In 2016, Prime Therapeutics, an American pharmacy benefits management company, hired Jacob Walls to bolster data loss prevention across the enterprise. The company serves 22 Blue Cross Blue Shield health care plans and more than 27 million members nationwide, including one out of every six people covered through US public healthcare exchanges. Since Prime Therapeutics’ […] more…Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital universe is a concern for many parents, but […] more…2018 Fraud World Cup
There are only two weeks to go before the start of the massive soccer event — FIFA World Cup. This championship has already attracted the attention of millions worldwide, including a fair few cybercriminals. Long before kick-off, email accounts began bulging with soccer-related spam, and scammers started exploiting the topic in mailings and creating World […] more…3 Ways to Strengthen Your Family Bond this Summer (Without Ditching Your Devices)
My parents recently went through a health crisis that required me to travel to be with them for several weeks. During that time, I started using FaceTime on my iPhone to daily connect with my teenage daughter back home. Until this life event, I wasn’t one to video chat. However, the live video technology of […] more…Why You Need To Know About “Cryptojacking”
As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has spiked over the last year, breaking the top 10 most commonly found malware families. Some attacks are designed to steal the currency outright, by robbing digital wallets, but the majority of threats come in the […] more…IT threat evolution Q1 2018
Targeted attacks and malware campaigns Skygofree: sophisticated mobile surveillance In January, we uncovered a sophisticated mobile implant that provides attackers with remote control of infected Android devices. The malware, called Skygofree (after one of the domains it uses), is a targeted cyber-surveillance tool that has been in development since 2014. The malware is spread by […] more…FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation
Our Cyber Safety Solutions team identified a malicious Chrome extension we named FacexWorm, which uses a miscellany of techniques to target cryptocurrency trading platforms accessed on an affected browser and propagates via Facebook Messenger. A very small percentage of users were affected by these malicious extensions, and Chrome had already removed many of these extensions […] more…Understanding Code Signing Abuse in Malware Campaigns
Using a machine learning system, we analyzed 3 million software downloads, involving hundreds of thousands of internet-connected machines, and provide insights in this three-part blog series. In the first part of this series, we took a closer look at unpopular software downloads and the risks they pose to organizations. We also briefly mentioned the problem […] more…Would Facebook and Cambridge Analytica be in Breach of GDPR?
The Cambridge Analytica (CA) and Facebook accusations over the U.S. 2016 presidential election campaign, and to a lesser extent between CA and the UK’s Brexit VoteLeave campaign, are — if proven true — morally reprehensible. It is not immediately clear, however, whether they are legally reprehensible. The matter is currently under investigation on both sides […] more…Panda Banker Trojan Goes to Japan
The banking Trojan known as Panda Banker is now targeting financial institutions in Japan for what appears to be first time. Also known as Panda Zeus, the malware was first observed in 2016, based on the leaked source code of the infamous Zeus banking Trojan. The threat has been involved in multiple infection campaigns targeting […] more…The Malicious Use of Artificial Intelligence in Cybersecurity
Criminals and Nation-state Actors Will Use Machine Learning Capabilities to Increase the Speed and Accuracy of Attacks Scientists from leading universities, including Stanford and Yale in the U.S. and Oxford and Cambridge in the UK, together with civil society organizations and a representation from the cybersecurity industry, last month published an important paper titled, The […] more…Intel CPUs Vulnerable to New ‘BranchScope’ Attack
Researchers have discovered a new side-channel attack method that can be launched against devices with Intel processors, and the patches released in response to the Spectre and Meltdown vulnerabilities might not prevent these types of attacks. The new attack, dubbed BranchScope, has been identified and demonstrated by a team of researchers from the College of […] more…More information
- Cyberespionage group Pawn Storm uses exploit for unpatched Java flaw
- HTTPS, SSL No Match for PASSTEAL Malware
- Watch a developer erase his face with the iPhone X
- Vulnerability Exposes F5 BIG-IP Systems to Remote DoS Attacks
- Security Incidents Can Cost Industrial Firms $500K Per Year: Kaspersky
- How to Find & Fix Mixed Content Issues with SSL / HTTPS
- Home Depot breach put 56 million payment cards at risk, company says
- Fake Bank App Ramps Up Defensive Measures
- SEC Chair Says Account on X Was Hacked
- The Android malware problem is not hyped, researchers say