Author: tetiana.vashchenko@data443.com

Reconnaissance Macro Malware

We reported in our 2015 Cyber Threats Yearbook about the return of macro malware in today’s threat landscape, as we have observed malicious documents being used to deliver further malware into the system by either dropping or downloading from compromised sites. We recently acquired a malicious document, which does not

CYREN 2015 Cyber Threats Yearbook: Stats, Cyber Analysis and Prediction for 2015

Our 2015 Cyber Threats Yearbook has just been released! Introduced by CTO Lior Kohavi, the comprehensive report analyzes many of last year’s most notable cybercrime trends as collected by CYREN’s GlobalView Cloud which monitors 17 billion transactions each day to protect more than 600 million users.   In addition to highlighting

Gazon SMS Trojan targets Android users by promising Amazon gift cards

Gazon is a malware targeting Android phones that sends multiple SMS text messages to every contact in the victim’s phone book. After opening the malware on the Android device the victim is told that he has won an Amazon gift card for $200. To redeem the gift card the victim

Revisiting Old Cybercriminal Techniques: PSYME Malware Revival

Zeus, ZeuS, or Zbot; a Trojan horse computer malware, has been around for a long time. It is known that the Zeus bot sends out spam emails that contain an executable binary which will download and install a bot program into the affected machine. Recently, we detected a Zeus Bot

Security-as-a-Service: Applied Cyber Intelligence for Enterprises

When applying the concept of trust to the security-as-a-service (SecaaS) delivery model, it is useful to think in terms of security history. With access to the Internet and email came viruses, spam drive-by downloads and phishing, and the corresponding perimeter security software and hardware to protect corporate systems. But, software

No Hidden camera on fake Youtube/Vimeo pages – only hidden malware

Last week, CYREN detected interesting emails that contained links to fake video pages. We have included a screenshot of the email. The rough translation of the subject line is “hidden camera in their house”, and the Youtube link looks like it might deliver the goods – but of course the

Destroying the ROI of Cybercrime– Part 2

In the battle to defend against the ever-increasing volume and variety of threats, security solutions like firewalls, signature-based antivirus, and blacklisting may be ineffective. This is because the criminals know that the data that powers them may lag new threats by days or even weeks. Cybercriminals have now further raised

Destroying the ROI of Cybercrime – Part 1

2015 will be another tough year in the continuing fight against cybercrime. Today’s Internet threat landscape is highly dynamic, as thousands of malicious actors disseminate hundreds of millions of global threats daily. While some actors are hacktivist organizations and even nation-states, the main threat remains that of well-funded cybercriminal gangs.

Phishing attack on popular German bank

Last week, the CYREN team detected a massive phishing attack on customers of the German bank Postbank, with more than 50,000 new phishing URLs detected within the first 24 hours. Phishing emails are traditionally sent to a massive group of people, in the hope that among the recipients are actual

Not Malware: Some Apps are Just…Well…Apps

When you work in the cybersecurity industry, friends and family often share with you spam emails that come through their inboxes, examples of potential malware and phishing links, and news articles about the latest cybercrime headline. I always welcome these emails as it gives those of us at CYREN a