by Jon | Sep 12, 2017 | Blog
As of Monday September 11, RA Labs is tracking a nascent BotNet that appears to consist mostly of exploited routers. While it bears some similarity to other popular telnet “IoT” BotNets, we have not yet determined which family this one belongs to. At first, our team...
by Jon | Sep 6, 2017 | Blog
Traditionally firewalls have been considered the edge of a network perimeter, and the first line of defense against cyber attacks. Firewalls, however, can only be as effective as the weakest link in the security chain. Often, the weakest link is on your payroll. This...
by Jon | Aug 24, 2017 | Blog
by Seth Elo We are no strangers to online code repositories and social media being abused for malicious intents. Attackers will use services like these in hopes to make their malware harder to detect, easier to manage, and give their bot’s C2 communications a lower...
by Jon | Jul 10, 2017 | Blog
In the last half of 2016, the rise of ransomware became a force to be reckoned with, with several new variants being discovered weekly. That trend has shown no signs of stopping in 2017. With one of the latest variants – called Petya by parts of the security community...
by Jon | Jul 7, 2017 | Blog
Coming To a Break Room Near You: Point-of-sale malware by Noah Dunker At about 6:00 AM on July 4th, 2017 RiskAnalytics’ ThreatSweep platform identified a break room vending kiosk at a customer’s office that had been infected with a point-of-sale malware family that’s...