Monthly Archives: January 2017

A look back at the Zyns iframer campaign

We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to getting infected. This is an interesting aspect when tracking campaigns and what they lead to. Typically, one can divide … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on A look back at the Zyns iframer campaign

Locky Bart ransomware and backend server analysis

In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware campaigns running called “Locky” and “Locky v2”. After some users reported being infected with Locky Bart, we investigated it … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Locky Bart ransomware and backend server analysis

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling admins for decades. Shelves of words have been spilled on the subject, to limited result. How do … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on How do I get my employees to stop clicking on everything?

Zbot with legitimate applications on board

Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with their own ideas. Recently, among the payloads delivered by exploit kits, we often find Terdot.A/Zloader – a downloader installing … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Zbot with legitimate applications on board

VirLocker’s comeback; including recovery instructions

VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now. VirLocker was the first example of a mainstream polymorphic ransomware and it left no expense of misery to its … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on VirLocker’s comeback; including recovery instructions

Avoid these “Free Minecraft / Garry’s Mod” adverts

Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies (Machinima). If you were heavily into memes about 8 to 10 years ago, you probably saw no end of … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Avoid these “Free Minecraft / Garry’s Mod” adverts

Expensive free apps

This post is the result of collaboration between Elevenpaths (Telefónica Cyber Security Unit) and Kaspersky Lab. Both companies have used their own expertise, researchers and tools, such as Tacyt (an innovative tool for the monitoring and analysis of mobile threats) … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Expensive free apps

Mobile Menace Monday: AndroRAT Evolved

An increasing amount of mobile malware known as Android/Trojan.AndroRAT has been seen in the wild lately.  AndroRAT is a contraction of Android and RAT (Remote Access Tool).  This piece of malware is far from new, but has gradually become more … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Mobile Menace Monday: AndroRAT Evolved

Machine learning versus spam

Machine learning methods are often presented by developers of security solutions as a silver bullet, or a magic catch-all technology that will protect users from a huge range of threats. But just how justified are these claims? Unless explanations are … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Machine learning versus spam

Understanding the basics of Two-Factor Authentication

Two-Factor Authentication (2FA) is the least complex version of Multi-Factor Authorization (MFA) and was invented to add an extra layer of security to the – now considered old-fashioned and insecure – simple login procedure using a username and a password. … Continue reading

Posted in Antivirus | Tagged , , , , , , , , , , , , , , , , | Comments Off on Understanding the basics of Two-Factor Authentication