Nuclear Exploit Kit Goes International Hits 150+ Countries

city_view_nuclear_final copyCisco’s research group Talos posted about their research on the Nuclear Exploit Kit HERE. They compare it to their research on Angler as well as break down the attack. Its a good read.

Talos is constantly monitoring the threat landscape and exploit kits are a constantly evolving component of it. An ongoing goal of Talos is to expose and disrupt these kits to protect the average internet user being targeted and compromised. We were able to gain unprecedented insight into Angler exploit kit and reveal details of the activity that were previously unknown. Now we have focused our attention on the Nuclear exploit kit with similar results. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

The Vigilante Who Hacked Hacking Team Explains How He Did It

hacker1

Motherboard posted a very interesting article on the person behind the breach of Hacking Team. Many people heard about Hacking Team being hacked however until now, there wasn’t any explanation of who, how or why it was done. The original post can be found HERE.

Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it. Continue reading

VN:F [1.9.22_1171]
Rating: 3.0/5 (2 votes cast)

Ransomware: Past, Present and Future

RansomwareIntroCisco’s research group Talos posted a detailed article on the history and current state of Ransomware HERE. They provided some best practices to protect your organization from being compromised. It is a bit of a long read but worth spending the time to check out.

The rise of ransomware over the past year is an ever growing problem. Businesses often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the reality. The problem we face is that every single business that pays to recover their files, is directly funding the development of the next generation of ransomware. As a result of this we’re seeing ransomware evolve at an alarming rate. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

How To Create An Untraceable New Identity

UntraceableIdentity1The Kernel posted a fantastic article on how to create a new digital identity. The original post can be found HERE. You may think it is as simple as creating a new email or social media account however there are many ways to be tracked. This post goes into those details. Continue reading

VN:F [1.9.22_1171]
Rating: 3.7/5 (3 votes cast)

Guest Speaker on Dr Chaos Security Podcast – Exploit Kits

podcastI was invited as a guest speakers on Dr. Chaos’s Security Podcast focused on the topic of Exploit Kits. For those unfamiliar with exploit kits, I posted a Exploit Kits 101 article HERE. In summary, exploit kits are tools attackers use to compromise and control systems. They are used to distribute malware such as remote access toolkits (RATs) and Ransomware. Below is a link to the youtube recording of the podcast. You can also find it on drchaos.com HERE. Continue reading

VN:F [1.9.22_1171]
Rating: 3.7/5 (3 votes cast)

MedStar Health Hacked, EHR Down, FBI Investigating

MedStarhackedMedStar has been hacked and it looks really ugly. You can find healthcare informatics’s story below as well as HERE. The Baltimore post examiner also posted about it HERE. News reports confirmed a cyber-attack on the 10-hospital MedStar Health system that had disabled the organization’s EHR. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

SAMSAM: The Doctor Will See You: After He Pays The Ransom

ransomwarehealthCisco Talos posted a great article on a new variant of ransomware targeting healthcare. The original post can be found HERE.

Cisco Talos is currently observing a widespread campaign leveraging the Samas/Samsam/MSIL.B/C ransomware variant. Unlike most ransomware, SamSam is not launched via user focused attack vectors, such as phishing campaigns and exploit kits. This particular family seems to be distributed via compromising servers and using them as a foothold to move laterally through the network to compromise additional machines which are then held for ransom. A particular focus appears to have been placed on the healthcare industry. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Anonymous Threatens Denver Over Homeless Camp Cleanup

anonymousVideo1Anonymous posted a warning video to Denver regarding its recent homeless camp cleanup law. Anonymous pointed out many reasons why this new law is a violation of human rights and states they would prefer a peaceful resolution. However, they claim “Expect Us”, so most likely actions will be taken against Denver officials if nothing is done about this threat. This post contains the Anonymous video and cbs article on this topic found HERE. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)