Top Categories

Spotlight

todayMarch 28, 2020

Case Study Mjolnir Security

Attack Type – Exploitation of novel / 0-day vulnerability

Scenario: Org2 is a specialist technology company based in the UK. The Org2 IT security operations team responded to an alert from its corporate anti-virus provider that a copy of password stealing malware had been found on three of its domain controllers. This was a serious incident, and an investigation [...]

Top Voted
Sorry, there is nothing for the moment.

Month: February 2017

2 Results / Page 1 of 1

Background
Image from https://www.govcert.admin.ch/

todayFebruary 22, 2017

close

News + Malware + Botnet Mjolnir Security

The Rise of Dridex and the Role of ESPs

Last week, we have warned Swiss citizens about a new malspam run targeting exclusively Swiss internet users. The attack aimed to infect them with Dridex. Dridex is a sophisticated eBanking Trojan that emerged from the code base of Bugat / Cridex in 2014. Despite takedown attempts by the security industry ...

todayFebruary 11, 2017

close

News + Financial Mjolnir Security

Analysis of Malware Used in Watering-Hole Attacks Against Polish Financial Institutions

Cyber4Sight has analyzed the malware distributed via the compromised Polish Financial Supervision Authority webpage and used in targeted attacks against a number of large banks and telecommunication companies. Read more: https://blog.cyber4sight.com/2017/02/technical-analysis-watering-hole-attacks-against-financial-institutions/ Indicator type Indicator FileHash-MD5 9cc6854bc5e217104734043c89dc4ff8 FileHash-MD5 e29fe3c181ac9ddbb242688b151f3310 FileHash-MD5 9914075cc687bdc352ee136ac6579707 FileHash-MD5 9216b29114fb6713ef228370cbfe4045 FileHash-MD5 5994a8fd8c68dd1cc51ce7ca0d9c2749 FileHash-MD5 40e698f961eb796728a57ddf81f52b9a FileHash-MD5 889e320cf66520485e1a0475107d7419 FileHash-MD5 25200d3fe30785f3c90a91faf8ebf1b5