You are here

Cybersecurity

Threat Awareness – Threat Actors Continue Experimenting with Alternative Techniques Since Microsoft Disabled Macros

Weaponized Microsoft documents were a highly favored technique until Microsoft put the kibosh on macros in files received from the internet last year. As such, WaterISAC been tracking the various tactics threat actors have migrated to. According to Proofpoint, Microsoft’s action has resulted in a monumental shift in activity and threat behavior over the last year in a way not previously observed by threat researchers.

Ransomware Resilience – Report: Organizations Using Backups to Recover from Ransomware See Lower Recovery Costs

Sophos has released its The State of Ransomware 2023 report, which concludes that “independent of revenue, geography, or industry, ransomware continues to be major threat to organizations.” Sophos supports this conclusion with that fact that the number of ransomware victims whose data was encrypted by their victimizer has grown to 76 percent, the highest the report has seen since it began in 2020.

Threat Awareness – Malvertising Campaign Utilizing New Loader to Drop Aurora

Recent analysis by Malwarebytes highlights how threat actors continue leveraging malvertising in various ways to proliferate malware. Malwarebytes posted a blog discussing a recently observed advertising campaign directing victims to download a new loader labeled Invalid Printer, which later delivers Aurora malware as a payload. The attack begins as users click on a potentially risky ad, which redirects them to a full-screen browser window mimicking a Windows security update.

Pages

Subscribe to Cybersecurity