article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Introduction It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. This malware employed a custom EternalBlue SMBv1 exploit to infiltrate its victims’ systems.

Malware 114
article thumbnail

Who is the Network Access Broker ‘Wazawaka?’

Krebs on Security

Wazawaka used multiple email addresses and nicknames on several Russian crime forums, but data collected by cybersecurity firm Constella Intelligence show that Wazawaka’s alter egos always used one of three fairly unique passwords: 2k3x8x57 , 2k3X8X57 , and 00virtual. ” WHO IS WAZAWAKA? Matveyev , in Abakan, Khakassia.

DDOS 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Promising Jobs at the U.S. Postal Service, ‘US Job Services’ Leaks Customer Data

Krebs on Security

By 2008, the USPS job exam preppers had shifted to advertising their schemes mostly online. Postal Service are breaking federal law,” the joint USPS-FTC statement said. In that 1998 case, the defendants behind the scheme were taking out classified ads in newspapers. Ditto for a case the FTC brought in 2005.

Marketing 274
article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

We have been doing so since 2008, benefiting from Kaspersky’s decades of cyberthreat data management, and unrivaled technologies. This is the most precious source of intelligence as it provides unique and reliable data from trusted systems and technologies. But why are we offering cyber threat intelligence at all?

article thumbnail

Mystic Stealer

Security Boulevard

Stealers" are a kind of malware designed to run on an endpoint post-compromise, while their primary features center on the theft of user data. Together with our colleagues at InQuest, we present a deep dive technical analysis of the malware. The same way you do in the real world – the market becomes flooded.

article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Company Product Est HQ Exabeam Exabeam Fusion 2013 Foster City, CA IBM Security QRadar SIEM 1911 Armonk, NY LogRhythm LogRhythm SIEM Platform 2003 Boulder, CO Securonix Next-Gen SIEM 2008 Addison, TX Splunk Splunk Enterprise Security 2003 San Francisco, CA. Long-term search capabilities for slower threats spanning historical data.

Software 111