Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy

Introduction The Sednit group, also known as APT28, Fancy Bear and Sofacy, is a group of attackers operating since at least 2004 and whose main objective is to steal confidential information from specific targets. In October 2016, ESET published an extensive analysis of Sednit’s arsenal and tactics in a whitepaper titled En Route with Sednit. Last … More Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy

Sathurbot: Distributed WordPress password attack

This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weak WordPress administrator accounts. The torrent leecher Looking to download a movie or software without paying for it? There might be associated risks. It just might … More Sathurbot: Distributed WordPress password attack

Proof-of-concept ransomware to poison the water supply

Ransomware is a big problem. Home users and organisations around the world have found themselves at the sharp end of high profile attacks that have encrypted their files, and demanded substantial amounts of money for their data’s safe recovery. The extortionists are earning themselves a fortune, as computer users and businesses feel compelled to pay … More Proof-of-concept ransomware to poison the water supply

Strategic cybersecurity will stymie ‘expanding threat landscape’

Companies need to implement strategic cybersecurity processes to stay better protected against the increasing threat of cyberattacks, a new survey has suggested. Cisco’s recent Annual Cybersecurity Report highlighted that over one-third of organizations that suffered a breach of security in 2016 reported a revenue loss of over 20%, which underlines how devastating such attacks can be. … More Strategic cybersecurity will stymie ‘expanding threat landscape’