July 25, 2014 | Jaime Blasco

Attackers abusing Internet Explorer to enumerate software and detect security products

During the last few years we have seen an increase on the number of malicious actors using tricks and browser vulnerabilities to enumerate the software that is running on the victim’s system using Internet Explorer.In this blog post we will describe some of the techniques that attackers are using to perform reconnaisance that gives them information for…

March 11, 2014 | Jaime Blasco

Botnet bruteforcing Point Of Sale terminals via Remote Desktop

Every single day our automated systems analyze hundreds of thousands of malicious samples. Yesterday one of the samples caught my attention because the malware started performing bruteforce attacks against Remote Desktop using certain username and passwords.MD5: c1fab4a0b7f4404baf8eab4d58b1f821Other similar samples: c0c1f1a69a1b59c6f2dab1813…

Get the latest security news in your inbox.

Subscribe via Email

February 25, 2014 | Bill Smartt

Detecting malware on Mac OS X with USM and MIDAS

Let’s briefly review what we accomplished in the first post:Understood the capabilities and design of MIDAS Deployed MIDAS on a Mac OS X endpoint installed the MIDAS plugin in AlienVault USM Verified the integration by running MIDAS and confirming the events in the SIEMHow does this make us safer? More generally, what does this mean?To…

February 21, 2014 | Jaime Blasco

Analysis of an attack exploiting the Adobe Zero-day - CVE-2014-0502

Yesterday FireEye reported about a new Zero-Day affecting Adobe Flash that is being exploited in the wild and Adobe issued a security update regarding the vulnerability.Several websistes were redirecting visitors to a malicious server containing the exploit including:Peterson Institute for International Economics American Research Center in Egypt Smith Richardson Foundationas reported by FireEye.The malicious Flash…

February 20, 2014 | Bill Smartt

Securing Mac OS X with USM and MIDAS

Protecting Mac OS X systems is a hot topic these days. Their prevalence in enterprise environments has been on the rise over the past decade, and the question of how to secure them remains a mystery to many.  This post will discuss new methods for securing Mac OS X.The internal security teams at Etsy, Facebook and GitHub recently…

February 19, 2014 | Alberto Ortega

Yara signatures for “Careto” - The Masked APT

Last week, Kaspersky Lab released their research (Unveiling "Careto" - The Masked APT) on a fresh APT campaign, which is supposed to had been running for several years. The campaign has different pieces of malware designed for Windows and OSX systems, and also clues of components for Android and iOS devices.The main targets of…

November 14, 2013 | Jaime Blasco

OTX Snapshot and top Threat Intelligence headlines from the last month

It's that time again: time to wrap up some of the top research findings and headlines about Internet security threats that intrigued the AlienVault Labs team in October.October was as busy a month for security news as ever; it even went mainstream in national press with Adobe having at least 38 million accounts being breached. Having been immersed in…

November 5, 2013 | Jaime Blasco

Microsoft Office Zeroday used to attack Pakistani targets

Earlier today Microsoft released a security advisory alerting about a new Microsoft Office vulnerability being exploited in the wild. The vulnerability affects Office 2003/2007 and Office 2010 only running on Windows XP/2003.The vulnerability is related to the parsing of TIFF images and Microsoft released a FixIt that basically block the rendering of TIFF images on the system.The exploit we…

October 24, 2013 | Jaime Blasco

PHP.net potentially compromised and redirecting to an exploit kit

This morning we woke up with news indicating that Google was flagging the php.net website as potentialy harmful.  You can read more information on:- http://news.netcraft.com/archives/2013/10/24/php-net-blocked-by-google-false-positive-or-not.html- http://barracudalabs.com/2013/10/php-net-compromise/We couldn't replicate the behavior as it seem the webmaster modified the files that were producing the…

October 17, 2013 | Alberto Ortega

Ransomware now accepts bitcoin as a payment method

Looking at the evolution of ransomware, accepting bitcoin as a payment method is probably taking too long for most common ransomware families.Not long ago, we have seen a ransomware family that accepts MoneyPak, Ukash, cashU and Bitcoin as payment methods. Its name is CryptoLocker and is detected by Microsoft as Crilock.A.Just one month after Microsoft released the…

October 16, 2013 | Jaime Blasco

OTX Snapshot: Top Malware Detected

This month, AlienVault launched a new Threat Update Newsletter with the goal of sharing recent threat data from our Open Threat Exchange™ (OTX), as well as recaps of some of the most interesting (or troubling) research and industry news. You can subscribe via e-mail to the Threat Update Newsletter, or subscribe to this blog to get additional information and…

October 10, 2013 | Alberto Ortega

Yara rules for leaked KINS toolkit

Just a few days ago, the source code of the famous KINS banking trojan was leaked.KINS is a professional-grade banking trojan, destinated to infect as much computers as possible in order to steal credit cards, bank account credentials and related information from victims. Seen as a replacement to Citadel, it was identified in the wild not long ago. Now,…

Watch a Demo ›
GET PRICE FREE TRIAL CHAT