Business

6 Results / Page 1 of 1

Background

todayJuly 5, 2023

  • 83
  • 6
close

Backdoor + Breach + Cyber security + Business + News + Malware + Ransomware Mjolnir Security

Understanding Qakbot, Cobalt Strike, and Their Impact on Canadian Businesses: Insights from Mjolnir Security

In today’s digital era, cyber threats have become more potent and pervasive, impacting individuals and businesses across the globe. Two such prevalent threats are Qakbot and Cobalt Strike, both of which have wreaked havoc in the Canadian business landscape. In this blog post, we delve into what these threats are, ...

Cybercrime + Digital Forensics + Incident Response + Business + News + Ransomware + APT + Threat Intelligence + Breach Mjolnir Security / April 9, 2023

Leveraging THOR for Enhanced Incident Response and Compromise Assessments: Mjolnir Security’s Partnership with Nextron Systems

Introduction Incident response and compromise assessments are essential practices in maintaining a strong cybersecurity posture. As cyber threats continue to evolve, organizations need cutting-edge tools to stay ahead of malicious actors. This is where the partnership between Mjolnir Security and Nextron Systems comes into play. By leveraging the THOR tool ...

todayMarch 17, 2023

  • 123
close

News + Cyber security + Business Mjolnir Security

FIPPA Law Compliance By Mjolnir Security

FIPPA Law Requires Public Bodies in B.C. to Overhaul Data Privacy Practices FIPPA Data Privacy Requirements Prompts Large Revision of Internal Practices FIPPA law revisions are now requiring public bodies in British Columbia to revise their own internal practices for data privacy, along with creating what is being called a ...

Mjolnir Security Torri Botnet IOC

todaySeptember 29, 2018

  • 156
close

Malware + Botnet + Exploits + Threat Intelligence + IoT + Business + News Mjolnir Security

Torii Botnet

Security researchers at Avast have discovered a new malware strain that uses comes with a quite rich set of features for exfiltration of (sensitive) information, modular architecture capable of fetching and executing other commands and executables and all of it via multiple layers of encrypted communication named Torii. We have already ...

todayJanuary 4, 2018

  • 133
close

Business + News + Exploits + Backdoor Mjolnir Security

Meltdown and Spectre – coming to a PC or Cloud Server near you

Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in ...

todayDecember 15, 2017

  • 112
close

Business + News + Malware + APT + Exploits + Backdoor + Threat Intelligence + Breach + SCADA Mjolnir Security

New ICS Attack Framework “TRITON” targeting Critical Infrastructure

Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. We have not attributed the incident to a threat actor, though we believe the activity is consistent with a nation state preparing for an attack. TRITON is one of a limited number of publicly identified malicious software families targeted at industrial control systems (ICS). It follows Stuxnet which was used against Iran in 2010 and Industroyer which we believe was deployed by Sandworm Team against Ukraine in 2016. TRITON is consistent with these attacks, in that it could prevent safety mechanisms from executing their intended function, resulting in a physical consequence. Malware Family Main Modules Description TRITON trilog.exe Main executable leveraging libraries.zip library.zip Custom communication library for interaction with Triconex controllers. Table 1: Description of TRITON Malware Incident Summary The attacker gained remote access to an SIS engineering workstation and deployed the TRITON attack framework to reprogram the SIS ...