Earlier this year we released our annual Phishing Trends and Intelligence report, which highlights how the phishing landscape has evolved over the past year.
Wait, Mother’s Day was last week? We promise, we didn’t forget, but we did have just a tiny bit of news to announce and that took center stage. But we’re back, and we’re shaking things up!
One of the most frustrating things about cyber crime is how rarely threat actors receive real punishment, particularly when they’re based abroad.
Last week we published the 2018 Phishing Trends and Intelligence report and presented on the topic during a webinar, and the primary key finding highlighted why enterprise organizations are now the primary target over consumers. The following is a high level look at what our Director of Threat Intelligence, Crane Hassold, discussed during the webinar.
This week we have our office manager Bri, and five suspicious emails to address. Like you, Bri will only have a few moments to quickly look at the lure and decide if it’s suspicious and should be reported, is safe, or is simply spam. We may have a few curve balls along the way, too.
For years the financial industry and email providers have been the top targeted industries, making up more than 50 percent of the total pie. In 2017, this was certainly still the case, but there is a new rapidly rising threat to the software as a service (SaaS) space as well.
As you are aware, phishing is certainly not a new cyber threat, yet it continues to be one of the most pervasive and costly to businesses and consumers. With nearly endless examples, we have decided to develop a new series that not only highlights some of these attacks, but also sharing helpful tips along the way for spotting them.
On Friday, March 23, nine Iranian threat actors were indicted for stealing massive quantities of data from universities, businesses, and governments all over the world.
If you’ve been following our blog (or the news), you already know the actors are associated with an organization called the Mabna Institute, and are responsible for stealing more than 31 terabytes of data over the past four and a half years. To put that number in context, you’d need to cut down more than 1.5 million trees to make enough paper to print out all of the stolen data.
Last week, news broke that an Iranian hacker network, Mabna Institute, had been systematically stealing data from universities across the US and abroad.
It’s unclear precisely how much data has been compromised, but it has been estimated to have cost US universities around $3.4 billion dollars to collect and maintain.
While the administration has announced sanctions and criminal indictments against the group, it’s highly unlikely any of the actors involved will receive punishment.
So if you happen to work for a university, or be responsible in some capacity for the data security of a university, you’d be forgiven for wondering “…What now?”
A newly observed variant of BankBot has been discovered masquerading as Adobe Flash Player, Avito, and an HD Video Player. This variant, now detected by PhishLabs as BankBot Anubis, was first identified on March 5, 2018.