Cybercrime

28 06, 2017

Petya NotPetya? Ransomware NotRansomware?

By |2017-10-04T09:53:48-07:00June 28th, 2017|Cybercrime|Comments Off on Petya NotPetya? Ransomware NotRansomware?

Details continue to emerge on the recent Petya attack and theories abound. To catch up, check out our post from day one of the attack. Infection M.E.Doc’s, a Ukrainian tax accounting system, software update also seems to be responsible, at least partially, for initial infections. Reports have also emerged around exploits of the CVE-2017-0199 Microsoft [...]

27 06, 2017

Petya Ransomware Attack: What We Know So Far

By |2018-02-12T11:40:30-07:00June 27th, 2017|Cybercrime|Comments Off on Petya Ransomware Attack: What We Know So Far

The story around today’s Petya (aka NotPetya) ransomware attack continues to evolve. Here’s what we know thus far. Exploit While some security firms have reported that Petya uses the EternalBlue exploit — the same as was used in the recent WannaCry ransomware attack — not all researchers are ready to confirm this. For now, it [...]

24 05, 2017

Why We’re Still Talking About WannaCry and You Should Too

By |2017-10-04T09:56:16-07:00May 24th, 2017|Cybercrime|Comments Off on Why We’re Still Talking About WannaCry and You Should Too

Unless you’ve been living under a rock, you’ve likely heard of or been hit by the WannaCry attack. It was so widespread that even if you have been living under a rock, you may have been locked out of your rock files, called up your rock CISO in a panic and second guessed every rock [...]

14 03, 2017

Nebula Exploit Kit

By |2017-10-04T10:10:48-07:00March 14th, 2017|Cybercrime|Comments Off on Nebula Exploit Kit

After the fall of Angler, Nuclear and Neutrino exploit kits in 2016, dark web sites were hailing the new king, RIG EK, and its newborn variants: RIG-V and RIG-E (aka Empire). But after four months of activity, one of the king’s newborns, the promised Empire, has fallen and a new leading exploit kit has emerged. [...]

6 03, 2017

A Brief History of Distributed Cybercrime

By |2017-10-03T15:51:59-07:00March 6th, 2017|Cybercrime|Comments Off on A Brief History of Distributed Cybercrime

For all the symbols on the picture above, this history could be summed up in one: $ Until 2006, cybercriminals behaved much like thieves in the physical world – trying to reach the “crown jewels” of an organization that held the most profit, then get the money and run. But that year, something changed. Evgeniy [...]