…well not the actual one on my laptop. The SSH client I use is WinSCP and the actual version I use is the one available via PortableApps.com. It is not malware. But the BlackCat ransomware group, also known as ALPHV, have spoofed the official WinSCP website and are distributing a …
So you are technically smart…
…it doesn’t mean you cannot be a cyber crime victim. Putting you under-pressure or approaching you when you are under stress is a classic way threat actors successfully exploit their victims. Here is an example on the BBC of such an attack: The robotic falcon maker who lost £100,000 to …
BYOD advice – Find malware where you least expect it
BYOD – bring your own device – probably every organisation has non-company devices handling sensitive information. Threat actors have created a trojanised version of a legitimate game installer that they are promoting through side channels to attract users (victims) to install it. The Super Mario game is installed and works …
Continue reading “BYOD advice – Find malware where you least expect it”
The anatomy of a spear phishing attack
A spear phishing attack is a malicious email (usually) with content aimed to exploit the specific recipient. Yee Ching Tok, over on SANS Internet Storm has an excellent article taking apart a spear phishing email targeting YouTube content creators. Analyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators …
Why modern software does not help with the cyber threat
Modern software often offers extra features through the use of code extensions such as using Python or in the case of Microsoft the macro. We all love the extra functionality – threat actors like the way this functionality allows them to slip malicious code through our defences to us. Microsoft …
Continue reading “Why modern software does not help with the cyber threat”
