The PhishLabs Blog

So You've Been Infected with Ransomware...

Posted by Jenny Dowd on Aug 18, '16

That awful moment…

You’re working away, getting tasks ticked off left and right… 

And then it happens. A terrible sinking feeling grips your stomach, and you know immediately what’s happened.

You’ve been infected with ransomware. The screen in front of you is filled with demands about Bitcoins, Tor, and encryption keys.

So what now?

You’ll have to tell your boss, of course. But once that’s done, there are some important tasks for you to complete.

Read More

Topics: Phishing, Hacker Tools, Ransomware, Spear Phishing

Recent Phishing Campaign Uses Jabber to Exfiltrate Compromised Information


While analyzing a recent phishing campaign targeting a Canadian financial institution, we came across an interesting technique used by the phishers to exfiltrate the personal and financial data obtained from victims.  Historically, phishers have most commonly used disposable email accounts to collect compromised information from phishing campaigns.  Sending compromised data to a temporary email account has likely been adopted by the phishing community because email accounts are easily accessible, and mailing scripts can be used or built with very little PHP knowledge.  Instead of forwarding phished data to an email account, we have also seen phishers that have stored victim information on the compromised phishing server, which allows them to consolidate all of the data into one file rather than having to sift through individual emails for each piece of information. 

Read More

Topics: Phishing, Hacker Tools, Spear Phishing

How to Defend Against Ransomware: The Three Stages

Posted by Jenny Dowd on Aug 9, '16

So far in this series we’ve covered the anatomy of a typical ransomware attack, and looked at some of the most common ransomware families

And that’s useful information to have, but it doesn’t answer the important question: 

How do I keep my organization safe?

So in this article we’ll go through some of the security measures you can take to minimize the likelihood of falling prey to a ransomware attack.

The most important thing to realize is that there’s no magic bullet. There’s no single approach, product, or vendor that can guarantee your complete safety from ransomware… or any other form of cyber attack, for that matter. (If you hear one tell you that, run away fast!)

Instead, there are three stages of defending against ransomware that you and your partners can use to make a ransomware infection far less likely.

Read More

Topics: Phishing, Hacker Tools, Ransomware, Spear Phishing

A Spotter's Guide to Ransomware

Posted by Jenny Dowd on Aug 3, '16

Ransomware is becoming an epidemic. 

From schools and hospitals to police departments, pharmaceutical companies, and even private citizens, it seems like nobody is safe.

And, of course, they aren’t.

So with that being the case, let’s take a look at the different types of ransomware, the most prominent families of 2016, and what’s driving so many threat actors to use this particular style of cybercrime.

Read More

Topics: Phishing, Hacker Tools, Ransomware, Spear Phishing, Bitcoin

The Anatomy of a Successful Ransomware Attack

Posted by Jenny Dowd on Jul 27, '16

 

You gasp.

Your head hangs, and your heart races. The instant you clicked, you knew something was wrong.

That email seemed so official, and all you did was follow a link… How did THIS happen?

But it’s too late for that now. What’s done is done.

You’ve been infected with ransomware, and now you’ll have to admit it to your boss.

Some difficult questions will be coming your way soon, but before we get to that…

Read More

Topics: Phishing, Hacker Tools, Ransomware, Spear Phishing, Bitcoin

Technical Dive into a Hardened Phish Kit

Posted by King Salemno on Apr 5, '16

 Many of the cybercriminals behind some of the most devastating cyber-attacks used phishing as the initial attack vector. At PhishLabs, we maintain a massive repository of phish kits that we continually analyze for intelligence about phishing tactics and techniques.  The complexity and sophistication of these kits vary greatly.

Read More

Topics: Phishing, Malware, Phish Kit, Hacker Tools

Supermarket Skimming, Loyalty Card Scams, VTech Hack Arrest, and more | TWIC - December 18, 2015

Posted by Lindsey Havens on Dec 18, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, PhishLabs, Hacker Tools, The Week in Cybercrime, Hacked, Patch, Breach

Dorkbot Gets Disrupted, Script Kiddies Targeted, Abundance of Patches, and more | TWIC - December 11, 2015

Posted by Lindsey Havens on Dec 11, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, PhishLabs, Hacker Tools, The Week in Cybercrime, Hacked, Patch, Breach

Fuel Pump Skimming, Holiday Inbox Scams, Children Gadgets Hacked, and more | TWIC - December 4, 2015

Posted by Lindsey Havens on Dec 4, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, PhishLabs, Exploit, Strategy, Hacker Tools, The Week in Cybercrime, Hacked, Breach

Stolen Military Information, ATM Fraud Prevention, Dridex Botnet Takedown, and more | TWIC - October 16, 2015

Posted by Lindsey Havens on Oct 16, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, Fraud, Exploit, Strategy, Adobe, Hacker Tools, The Week in Cybercrime, Hacked, Patch, Spear Phishing Protection

   

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Upcoming Events

Calendar_Mock_