Recent Posts

Recent Blog Posts

The PhishLabs Blog

Surge in ZLoader Attacks Observed

Posted by Jessica Ellis on Feb 23, '21

PhishLabs has observed a spike in malicious emails distributing ZLoader malware. The spike is notably one of the greatest upticks for a single payload observed in a 24-hour period over the past year, and is the first significant sign that another botnet may be stepping up in the aftermath of the Emotet takedown
Read More

Topics: Banking Trojan, Ransomware

OSINT: Mapping Threat Actor Social Media Accounts

Posted by The PhishLabs Team on Feb 15, '21

A threatening social media post targeting an executive, employee, brand, or any other asset often has merit to it, and investigating the online accounts associated with the threat actor is imperative in the process of assessing risk. By mapping social media accounts operated by the threat actor, as well as general social media risk monitoring, you can build a more comprehensive profile of the user and better assess the risk posed. It can also reveal the real-life identity of the user if they have attempted to remain anonymous.
We recently published a blog focused on the importance of determining a social media user’s location, and the same is true in gauging the behavior of an online user through posted content across their social media accounts. Past activity, interactions, and anonymous accounts may all help to determine the level of risk and can provide security teams valuable insight into whether or not mitigation should be pursued. 
Read More

Topics: OSINT

Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In

Posted by Jessica Ellis on Feb 9, '21

Recently, we published a piece highlighting early stage loaders often used in ransomware attacks. One of the most prolific was Emotet, which has since been taken down via a coordinated, multi-national effort. How will this impact the threat landscape? In this post, we take a look at loader activity in the aftermath of the Emotet takedown.
Read More

Topics: Malware, Ransomware

Threat Actor using Social Media to Scam Credit Union Members

Posted by Jessica Ellis on Feb 1, '21

Recently, PhishLabs mitigated an attack using a fake social media page to steal the credentials of a credit union (CU) customer. Social media is increasingly used as a vehicle for attacks, and organizations should adopt  social media protection measures to stay ahead of threats. The below demonstrates how the attack was executed.
Read More

Topics: Social Media Threats

Sharp Increase in Emotet, Ransomware Droppers

Posted by Jessica Ellis on Jan 26, '21

Ransomware continues to be one of the most  impactful threats to enterprises. Aside from external vulnerabilities, its primary delivery method remains email phishing, with links or attachments containing early stage loaders. These loaders initiate attacks by compromising systems and installing additional malware. PhishLabs has analyzed these early stage loaders and observed a dramatic increase in ransomware droppers delivered via email. Below are the findings. 
Read More

Topics: Ransomware

Using Social Media OSINT to Determine Actor Locations

Posted by The PhishLabs Team on Jan 19, '21

Read More

Activists Leak Data Stolen in Ransomware Attacks

Posted by Jessica Ellis on Jan 7, '21

The activist group known as Distributed Denial of Secrets (DDoSecrets) has published almost one terabyte of data originally leaked to dark web sites by ransomware operators. In addition, they are privately making another 1.9 terabytes of stolen data available to journalists or academic researchers. 
Read More

Look-alike Domain Mitigation: Breaking Down the Steps

Posted by The PhishLabs Team on Dec 21, '20

Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where each step in its creation represents a point where actions can be taken to mitigate the threat. 
Read More

Year In Review: Ransomware

Posted by Jessica Ellis on Dec 15, '20

In 2020, cybercrime has seen a dramatic evolution in ransomware attacks. This threat type has adopted increasingly malevolent tactics and targeted some of the year's most vulnerable industries. Operators are linking up, franchising their attacks, extorting their victims, then expecting organizations to believe them trustworthy. By 2021, ransomware is anticipated to cause $20 billion in loss. 
Read More

Topics: Ransomware

The Anatomy of a Look-alike Domain Attack

Posted by Tricia Harris on Dec 11, '20

Cybercriminals register hundreds of thousands of look-alike domains every year to impersonate reputable brands and make a profit. These domains are used for a variety of attacks including phishing emails, fraudulent websites, web traffic diversion, and malware delivery.

Read More

Topics: Spear Phishing Protection, business email compromise, Digital Risk Protection, Domains

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Subscribe to Email Updates

Posts by Topic

see all