DDoS & Security Reports Blog

The Arbor Networks ASERT team blog

  • Observed Spike in DDoS Attacks Targeting Hong Kong

    Observed Spike in DDoS Attacks Targeting Hong Kong

    Introduction Each week ASERT produces a weekly threat intelligence bulletin for Arbor customers. In addition to providing insights into the week’s security news and reviewing ASERT’s threat...

    Read Article
  • Acronym: M is for Malware

    Acronym: M is for Malware

    A malware researcher known as Antelox recently tweeted about an unknown malware sample that caught our eye. Upon further investigation, it is a modular malware known as Acronym and could possibly...

    Read Article
  • DDoS Attacks in Luxembourg

    DDoS Attacks in Luxembourg

    According to media reports, Luxembourg fends off cyberattack on government sites Gilles Feith, the chief of the CTIE government IT center, said Wednesday that it was the first time the Luxembourg...

    Read Article
  • Change All Your Passwords, Right Now!

    Change All Your Passwords, Right Now!

    by Steinthor Bjarnason, Senior ASERT Security Analyst & Roland Dobbins, ASERT Principal Engineer CloudFlare are probably best known as a DDoS mitigation service provider, but they also operate one...

    Read Article
  • Change All Your Passwords, Right Now!

    by Steinthor Bjarnason, Senior ASERT Security Analyst & Roland Dobbins, ASERT Principal Engineer CloudFlare are probably best known as a DDoS mitigation service provider, but they also operate one...

    Read Article
  • Additional Insights on Shamoon2

    Additional Insights on Shamoon2

    IBM analysts recently unveiled a first look at how threat actors may have placed Shamoon2 malware on systems in Saudi Arabia. Researchers showcased a potential malware lifecycle which started with...

    Read Article
  • Flokibot Invades PoS: Trouble in Brazil

    Flokibot Invades PoS: Trouble in Brazil

    Introduction Threat actors salivate at the thought of an increased volume of credit and debit card transactions flowing through endpoints they have compromised with card-stealing malware. While...

    Read Article
  • Flokibot Invades PoS: Trouble in Brazil

    Flokibot Invades PoS: Trouble in Brazil

    Introduction Threat actors salivate at the thought of an increased volume of credit and debit card transactions flowing through endpoints they have compromised with card-stealing malware. While...

    Read Article
  • Non-Government Organization in Support of Government Hopes

    Red Team analysis is the process of viewing a situation from the perspective of an adversary thus providing insights beyond those that might otherwise be limited by normative biases. This blog...

    Read Article
  • Non-Government Organization in Support of Government Hopes

    Non-Government Organization in Support of Government Hopes

    Red Team analysis is the process of viewing a situation from the perspective of an adversary thus providing insights beyond those that might otherwise be limited by normative biases. This blog...

    Read Article
  • Dismantling a Nuclear Bot

    Dismantling a Nuclear Bot

    A recent tweet mentioned that a new banking malware called “Nuclear Bot” has started to appear for sale on underground marketplaces. Its price starts around $2500 which is more than double the...

    Read Article
  • Dismantling a Nuclear Bot

    Dismantling a Nuclear Bot

    A recent tweet mentioned that a new banking malware called “Nuclear Bot” has started to appear for sale on underground marketplaces. Its price starts around $2500 which is more than double the...

    Read Article
  • Dismantling a Nuclear Bot

    Dismantling a Nuclear Bot

    A recent tweet mentioned that a new banking malware called “Nuclear Bot” has started to appear for sale on underground marketplaces. Its price starts around $2500 which is more than double the...

    Read Article
  • On the Economics, Propagation, and Mitigation of Mirai

    By Kirk Soluk and Roland Dobbins In late November of 2016, a new Mirai variant emerged that leveraged a propagation mechanism different from the Telnet-based brute forcing mechanism originally...

    Read Article
  • On the Economics, Propagation, and Mitigation of Mirai

    On the Economics, Propagation, and Mitigation of Mirai

    By Kirk Soluk and Roland Dobbins In late November of 2016, a new Mirai variant emerged that leveraged a propagation mechanism different from the Telnet-based brute forcing mechanism originally...

    Read Article
  • Analysis of CryptFile2 Ransomware Server

    Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and...

    Read Article
  • Analysis of CryptFile2 Ransomware Server

    Analysis of CryptFile2 Ransomware Server

    Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and...

    Read Article
  • Diving Into Buhtrap Banking Trojan Activity

    Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported...

    Read Article
  • Diving Into Buhtrap Banking Trojan Activity

    Diving Into Buhtrap Banking Trojan Activity

    Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported...

    Read Article
  • FlokiBot: A Flock of Bots?

    In early October, Flashpoint released an analysis of an underground forum advertisement for a new malware family known as FlokiBot. It took some time before a sample was found in the wild, but a...

    Read Article
  • loading
    Loading More...