Search
Close this search box.

Blog

Protect Office 365 Email from Ransomware

Ransomware is continually evolving. It has become the “most prominent malware threat”, with experts estimating that ransomware attacks in 2021 resulted in total damage costs of $20 billion. While there is no ransomware that specifically targets Office 365 data, it can still affect Exchange Online, Sharepoint Online, and other cloud

Read More >

Email Hijacking Delivers Qakbot Malware

Introduction  Originally a banking Trojan that existed in the wild as early as 2007, Qakbot (or QBot) is a pioneer of malware as a service, which is continually maintained and developed to this day. While its main purpose is to steal banking credentials such as logins and passwords, it has

Read More >

Example Analysis of Multi-Component Malware

Recently, we have received an increase in the number of malicious email samples with password-protected attachments. The recent waves of attacks with Emotet use a similar approach. In this blog we describe our analysis of another set of samples that used file archives (e.g. zip file) secured with passwords. Figures

Read More >

How the War in Ukraine Has Influenced the Scammers’ Underground

For the past three months, most media news headlines have been talking about a painful subject that leaves no one indifferent: the war. Since the start of the Russian invasion of Ukraine, the international community has been helping the victims by donating to various charities and providing direct assistance to

Read More >

The Resurgence of Emotet

Password Protected Docs One of the most recent Emotet samples we received were emails with password protected attachments. Although the malicious document needs an extra step to be accessed compared to just being attached as it is, the additional layer of ‘security’ may cause an unsuspecting user to think that

Read More >

Malicious Excel Add-in Variant Delivers Malware

XLL is an Excel Add-in extension file that provides ways to use third-party tools and functions that are not available in Microsoft Excel. It is typically a Dynamic Link Library (DLL) file that can be loaded by Microsoft Excel provided the file uses the .xll extension. We have seen a

Read More >

What Are Office 365 Safe Attachments?

Office 365 Safe Attachments is a feature of Microsoft 365 Advanced Threat Protection (also known as Microsoft 365 Defender) that provides another layer of protection to incoming emails by scanning its attachments for malicious software. Phishing emails and attacks are more prevalent than ever with the FBI Internet Crime Complaint

Read More >

What is a Zero-Day Phishing Attack? Identifying Vulnerabilities & More

“Zero-day” is a term that broadly describes a series of recently discovered cybersecurity vulnerabilities hackers utilize to attack systems. This term, “zero-day”, often refers to the fact that the developers have just learned about the flaw. Hackers will exploit flaws they find before developers even have a chance to address

Read More >

What is Smishing? Prevention, Examples & More

Key Points: Smishing is causing millions of dollars in losses. Robokiller insights show that consumers have received over 12 billion in robotexts. Fraudsters are smart people who are very good at designing texts that make people take immediate action. When receiving a text message that claims to be from your

Read More >