••• All important news related to new attacks and see the solutions we can offer you •••
Emotet malware - new 'Red Dawn'
The Emotet botnet has begun to use a new template for their malicious attachments, and it is just as dangerous as ever.
After a five-month "vacation," the Emotet malware returned in July 2020 and began to spew massive amounts of malicious spam worldwide.
These spam campaigns pretend to be invoices, shipping information, COVID-19 information, resumes, financial documents, or scanned documents.
Malware authors trick Apple into trusting malicious Shlayer apps
The authors of the Mac malware known as Shlayer have successfully managed to get their malicious payloads through Apple's automated notarizing process.
Since February 2020 all Mac software distributed outside of its Mac App Store must be notarized by Apple to be able to run on macOS Catalina and above.
The notarization process requires developers to submit software they built for the macOS platform to be scanned through Apple's notary service, an automated system designed to scan submitted software for both malicious components and code-signing issues.
If they pass this automated security check, the apps are allowed by the macOS Gatekeeper - a macOS security feature that checks if downloaded apps have been checked for known malicious content - to run on the system.
North Korea's BeagleBoyz Robbing BanksLees de originele artikel hier
This joint advisory is the result of analytic efforts among the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM). Working with U.S. government partners, CISA, Treasury, FBI, and USCYBERCOM identified malware and indicators of compromise (IOCs) used by the North Korean government in an automated teller machine (ATM) cash-out scheme—referred to by the U.S. Government as “FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks.”
New identified malware used by the NorthKorean government in an automated teller machine (ATM) cash-out.
This mallware can be simulated and your can test if your environment is vulnerable using Cymulate BAS solution