It is a long title but it explains exactly what this post is about. The instructions for setting up simple but profitable social engineering and phishing email campaigns are easily available across the ordinary internet, not just the dark web. The software required is free, both the malicious stuff and …
There may not be direct cyber attacks from the Russia Ukraine conflict but others are taking advantage of the situation
Researchers at Google have been tracking various phishing cyber attacks, that are exploiting the Russia Ukraine conflict, but originate from other countries. China, Iran, North Korea, Russia and others using Ukraine invasion in phishing attacks: Google – The Record by Recorded Future Both state sponsored and financially motivated groups are …
IcedID Malware – something you do not want run – so check your Exchange server
There are reports of hackers exploiting Microsoft Exchange servers, that have not been patched, to distribute spam email infected with IcedID malware. If you do run IcedID on your PC, the malware compromises the security of your machine opening a backdoor for other malware to be injected into your computer. …
Continue reading “IcedID Malware – something you do not want run – so check your Exchange server”
MFA is essential but it has it’s issues
We are always insisting that our clients always use multi-factor authentication (MFA) for absolutely every service they use. It is a prerequisite of any client we manage Microsoft 365 for that MFA is activated and enforced for everyone of their users. However, of course, there are ways that hackers exploit …
Do you know what an .xlsb file is? The hackers do and it is another way to obscure their malicious payloads
Here is yet another email attachment, examined by Xme, at SANS Internet Storm and for you to look out for: XLSB Files: Because Binary is Stealthier Than XML – Sans Internet Storm Centre For phishing attacks to succeed the hackers need to exploit your trust – for them to fail …