Yesterday I published my latest article over on our online training site CyberAwake looking at the most basic of cyber-attacks – an infected phishing email. Don’t be tempted to open that zip file A story of a phishing email – CyberAwake Could you people deal with this situation? QBot Malware: …
You should be on the lookout for this phishing campaign…
There is an active email phishing campaign infecting both home users and organisations. The malicious emails contain a .zip attachment. The payload is called IceXLoader and it primarily exfiltrates sensitive information from infected systems: Phishing drops IceXLoader malware on thousands of home, corporate devices (bleepingcomputer.com) The threat actors are not …
Continue reading “You should be on the lookout for this phishing campaign…”
Business Email Compromise
Everyone needs policies and procedures that address the potential risk of business email compromise (BEC). That is when the threat actors through impersonation or compromised credentials get inside an email system and send malicious business instructions to your team pretending to senior people in your organisation or trusted partners. Here …
Emotet is back
Just when it looked like the Emotet spamming/malware operation had stopped, there are widespread reports that it has restarted. Emotet botnet starts blasting malware again after 5 month break (bleepingcomputer.com) Infected Microsoft Office documents are Emotet’s favoured method of malware distribution. Once the email has slipped past your technical defences, …
Steal the code… Dropbox
Dropbox has admitted that 130 of its confidential private GitHub repositories were coped by a threat actor. Among the haul were secret APUI codes. They do reassure users that no user content, usernames or passwords were stolen. Well of course not. That is not the issue. Why bother stealing those …