Category: Blog

The Hidden Costs of Phishing & BEC

A couple of months ago we sat down with Damian Stalls, vCIO director at Fluid Networks to discuss how they dramatically reduced the time their security analysts spent managing the problem of phishing, BEC, and user education. Here were some of the highlights from our discussion. Recovering From Successful Attacks

3 Ways to Optimize Your Security Awareness Training Program

Despite investments of time and money in secure email gateways, phishing threats continue to be delivered to the user’s inbox. To close this gap in automated detection, many organizations roll out user security awareness programs to train their employees to spot and avoid these threats. Even that, however, hasn’t brought

Protect Office 365 Email from Ransomware

Ransomware is continually evolving. It has become the “most prominent malware threat”, with experts estimating that ransomware attacks in 2021 resulted in total damage costs of $20 billion. While there is no ransomware that specifically targets Office 365 data, it can still affect Exchange Online, Sharepoint Online, and other cloud

Email Hijacking Delivers Qakbot Malware

Introduction  Originally a banking Trojan that existed in the wild as early as 2007, Qakbot (or QBot) is a pioneer of malware as a service, which is continually maintained and developed to this day. While its main purpose is to steal banking credentials such as logins and passwords, it has

Example Analysis of Multi-Component Malware

Recently, we have received an increase in the number of malicious email samples with password-protected attachments. The recent waves of attacks with Emotet use a similar approach. In this blog we describe our analysis of another set of samples that used file archives (e.g. zip file) secured with passwords. Figures

How the War in Ukraine Has Influenced the Scammers’ Underground

For the past three months, most media news headlines have been talking about a painful subject that leaves no one indifferent: the war. Since the start of the Russian invasion of Ukraine, the international community has been helping the victims by donating to various charities and providing direct assistance to

The Resurgence of Emotet

Password Protected Docs One of the most recent Emotet samples we received were emails with password protected attachments. Although the malicious document needs an extra step to be accessed compared to just being attached as it is, the additional layer of ‘security’ may cause an unsuspecting user to think that

Malicious Excel Add-in Variant Delivers Malware

XLL is an Excel Add-in extension file that provides ways to use third-party tools and functions that are not available in Microsoft Excel. It is typically a Dynamic Link Library (DLL) file that can be loaded by Microsoft Excel provided the file uses the .xll extension. We have seen a

What Are Office 365 Safe Attachments?

Office 365 Safe Attachments is a feature of Microsoft 365 Advanced Threat Protection (also known as Microsoft 365 Defender) that provides another layer of protection to incoming emails by scanning its attachments for malicious software. Phishing emails and attacks are more prevalent than ever with the FBI Internet Crime Complaint

What is a Zero-Day Phishing Attack? Identifying Vulnerabilities & More

“Zero-day” is a term that broadly describes a series of recently discovered cybersecurity vulnerabilities hackers utilize to attack systems. This term, “zero-day”, often refers to the fact that the developers have just learned about the flaw. Hackers will exploit flaws they find before developers even have a chance to address