Bandit Stealer malware is promoted by the hacker developers as the most advanced information stealer available to threat actors. It can exfiltrate data from most popular browsers including usernames and cookies and other system information such as IP addresses and details of a victim’s computer. The Telegram messaging app is …
The Capita Data Breach
Why does the Capita data breach have something to teach every organisation about cyber security? When a company has many clients for whom they do so many things, it stands to reason that threat actors will take an interest. One breach and the criminals get access to a wide range …
Email Phishing is a constantly changing threat
One of the topics covered at the cyber security conference I was at last week was how AI tools such as ChatGPT are helping threat actors refine the social engineering messages that enable the success of an email phishing attack. Our Cyber Security Awareness Training still includes looking out for …
Continue reading “Email Phishing is a constantly changing threat”
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
Phishing emails – can you recognise them?
Phishing emails with a carefully scripted social engineering message, a malicious .pdf file with links to malware stored in Firebase Storage on Google. Brad Duncan on SANS InfoSec Handlers Diary Blog has the full story including screenshots of the phishing email and the steps to infection: Recent IcedID (Bokbot) activity …
Continue reading “Phishing emails – can you recognise them?”