Preventing Bad Rabbit Is Only Remarkable If It's Unremarkable

Posted by Arthur Braunstein on October 27, 2017 at 8:55 PM

In the last 48 hours, a hurricane of e-mails has crossed my Inbox, with breathless and self-congratulatory subject lines like "Our latest release detects Bad Rabbit" and "XYZ now protects XYZ customers from Bad Rabbit." In other words, "If you use our product, you were exposed to Bad Rabbit, but now that we know about it (from someone else) we deployed an update." Once you decode the messages, it’s clear that the content is not newsworthy, differentiating or exciting, it’s just an excuse to partake in the latest frenzy.

Read More

Topics: Cyber Attacks, Ransomware, Cyber Security

Hospitality Industry Needs Shelter From Cyber Threats

Posted by Shelley Leveson on June 27, 2017 at 9:25 AM

Two weeks ago, Morphisec Lab, led by VP R&D Michael Gorelik, warned of a new attack by the FIN7 cybercrime group against restaurants across the US. Earlier this year, the financially motivated FIN7 group, one of the leading threat actor groups operating today, targeted restaurant chains Chipotle, Baja Fresh and Ruby Tuesday, among others. And you certainly remember the massive 2016 attack on the Wendy’s fast food chain, which resulted in over 1000 Wendy’s locations hit by a credit card breach. Numbers were also big in the Arby’s data breach discovered in January 2017: according to the credit union service PSCU, 350,000 credit and debit card accounts might have been impacted by the hack on Arby’s point-of-sale (PoS) systems.

Read More

Topics: Cyber Attacks, Advanced Persistent Threats, Endpoint Security, Fileless Attacks

FIN7 Takes Another Bite at the Restaurant Industry

Posted by Michael Gorelik on June 9, 2017 at 6:40 PM

INTRODUCTION

On June 7, 2017, Morphisec Lab identified a new, highly sophisticated fileless attack targeting restaurants across the US. The ongoing campaign allows hackers to seize system control and install a backdoor to steal financial information at will. It incorporates some never before seen evasive techniques that allow it to bypass most security solutions – signature and behavior based.

Read More

Topics: Cyber Attacks, Endpoint Security, Cyber Security, Attack Analysis

Threat Profile: Jaff Ransomware

Posted by Morphisec Team on May 20, 2017 at 2:03 AM

Last week, a massive wave of spam email that infects victims with a new type of ransomware, dubbed "Jaff", flooded networks across Europe, North America and Australia. Estimates put the number of malicious emails in the tens of millions.

Read More

Topics: Cyber Attacks, Endpoint Security, Ransomware, Cyber Security, Threat Profile

Ransomware - Answer with a Solid Cyber Security Strategy

Posted by Arthur Braunstein on May 14, 2017 at 11:24 PM

Last week’s news about cyberattacks was sobering. Cybercrime is rampant and notorious. “WannaCry,” “Jaff,” and “Cerber” - the names of the attacks that got the most publicity - read like names of gangsters from the days of Prohibition, with unique personalities, techniques that range from brutal to devious, and a lurid line-up of targets and victims. Only the wanted posters are missing.

Read More

Topics: Cyber Attacks, Ransomware, Cyber Security

Cyber Threat Trends: Spotlight on the UK

Posted by Morphisec Team on May 5, 2017 at 7:43 PM

Spurred by both government and private efforts, the UK has seen a renewed and determined focus on cyber security issues this year. Much of this can be attributed to the new National Cyber Security Centre (NCSC), which became operational in October 2016 and was officially launched February 2017 by Her Majesty the Queen. The organization’s stated mission? “Helping to make the UK the safest place to live and do business online.”

Read More

Topics: Cyber Attacks, Industry News, Cyber Security

Building Security Resiliency Into Critical Infrastructure

Posted by Mordechai Guri, Ph.D. on April 18, 2017 at 8:24 AM

 

This article previously appeared on Information Management. Mordechai Guri is Chief Science Officer at Morphisec.

National Cybersecurity Awareness Month closed by focusing on scenarios straight out of action movies and nightmares – attacks on our critical infrastructure. These days, however, the threat is more likely to come from an innocent seeming email than bomb-toting terrorists à la Die Hard.

Utilities, hospitals, transportation systems, and all the other systems our communities and countries depend on are increasingly digitally controlled and connected. This brings tremendous productivity and reliability gains: better alignment of supply and demand, predictive maintenance planning, predictive outage response, instantaneous sharing of vital data and more. In some cases, like health care, it can make the difference between life and death.

Read More

Topics: Cyber Attacks, Advanced Persistent Threats, Endpoint Security, Cyber Security

Morphisec Discovers New Fileless Attack Framework

Posted by Michael Gorelik on March 16, 2017 at 7:55 PM

Morphisec Discovers New Fileless Attack Framework

Ties Single Threat Actor Group to Multiple Campaigns, Interacts with Hacker.

On the 8th of March, Morphisec researchers began investigating a new fileless threat delivered via a macro-enabled Word document, which was attached to a phishing email sent to targeted high-profile enterprises. During the course of the investigation, we uncovered a sophisticated fileless attack framework that appears to be connected to various recent, much discussed attack campaigns.

Read More

Topics: Cyber Attacks, Cyber Security, Attack Analysis, Fileless Attacks

Andromeda’s Five Star Custom Packer – Hackers’ Tactics Analyzed

Posted by Roy Moshailov on March 13, 2017 at 8:08 AM

Packer-based malware is malware which is modified in the runtime memory using different and sophisticated compression techniques. Such malware is hard to detect by known malware scanners and anti-virus solutions. In addition, it is a cheap way for hackers to recreate new signatures for the same malware on the fly simply by changing the encryption/packing method. Packers themselves are not malware; attackers use this tactic to obfuscate the code’s real intention.

Read More

Topics: Cyber Attacks, Sandbox evasion, Cyber Security, Attack Analysis, Custom Packer

How to Build an Economically-Driven Cyber Defense Strategy

Posted by Ronen Yehoshua on January 27, 2017 at 1:07 AM

Today, a few hackers may be ideologically motivated, but the majority of attacks are financially-driven crimes. This is seen most clearly in the rise of ransomware; no mystery, just pure and simple extortion. And consider the latest victim of choice, the healthcare industry, sacrosanct in most people’s eyes but merely a lucrative, vulnerable target to cybercriminals. As such, cybercrime follows the economic rules of any business – reward must outweigh costs – and should be confronted on those terms.

Read More

Topics: Cyber Attacks, Endpoint Security, CISO, Cyber Security

Check out our Attack Analyses!

Take a deep dive into technical analyses of attacks prevented by Morphisec.

Subscribe to our Blog

Happy to keep you in the loop with industry insight, cyber security trends,  and cyber attack information and company updates.

Morphisec Named a Cool Vendor 2016

Morphisec is a Gartner Cool Vendor 2016

Each year Gartner identifies new Cool Vendors it considers innovative or transformative. Morphisec is honored be to named a Cool Vendor 2016. Here's more....

 

Recent Posts

Most Popular Posts