Breaking News

•••  All important news related to new attacks and see the solutions we can offer you  •••

03/09/2020

Emotet malware - new 'Red Dawn'

Cyber Defense

The Emotet botnet has begun to use a new template for their malicious attachments, and it is just as dangerous as ever.

After a five-month "vacation," the Emotet malware returned in July 2020 and began to spew massive amounts of malicious spam worldwide.

These spam campaigns pretend to be invoices, shipping information, COVID-19 information, resumes, financial documents, or scanned documents.

Contact us for a test with Cymulate breach and Attack simulation
01/09/2020

Malware authors trick Apple into trusting malicious Shlayer apps

Cyber Defense

The authors of the Mac malware known as Shlayer have successfully managed to get their malicious payloads through Apple's automated notarizing process.

Since February 2020 all Mac software distributed outside of its Mac App Store must be notarized by Apple to be able to run on macOS Catalina and above.

The notarization process requires developers to submit software they built for the macOS platform to be scanned through Apple's notary service, an automated system designed to scan submitted software for both malicious components and code-signing issues.

If they pass this automated security check, the apps are allowed by the macOS Gatekeeper - a macOS security feature that checks if downloaded apps have been checked for known malicious content - to run on the system.

Contact us for a test with Cymulate breach and Attack simulation
31/08/2020

North Korea's BeagleBoyz Robbing Banks

Lees de originele artikel hier
Cyber Defense

 

This joint advisory is the result of analytic efforts among the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM). Working with U.S. government partners, CISA, Treasury, FBI, and USCYBERCOM identified malware and indicators of compromise (IOCs) used by the North Korean government in an automated teller machine (ATM) cash-out scheme—referred to by the U.S. Government as “FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks.”

 

New identified malware used by the NorthKorean government in an automated teller machine (ATM) cash-out.

 

This mallware can be simulated and your can test if your environment is vulnerable using Cymulate BAS solution
 

Contact us for a test with Cymulate breach and Attack simulation
Load more