Targeted and personalized emails combined with a variety of malware represent a new and sophisticated approach from a particular actor we’ve been tracking this year.
So-called "typosquatters" aren't just getting savvier - they have a whole new world of top-level domains to use to trick businesses and consumers into giving up their personal information.
On March 13, 2016, Proofpoint researchers observed a large malvertising campaign hitting many highly-ranked websites including MSN.com, foxnews.com and many others. We also surmised (and later confirmed) that there was a video malvertising involved in this campaign. While such campaigns aren't new, this appears to be the first such documented campaign leading to an exploit kit.
Obfuscation, sophisticated lures, and well-written phishing kits combine to make this a risky tax season for unsuspecting filers.
The Carbanak gang appears to be back, and Proofpoint researchers analyze the early stages of a campaign that could steal another billion dollars.
Proofpoint researchers have identified a new Trojan with robust functionality from authors who also appear to be prepared to offer a complete ecosystem of tools for malicious actors.
Phishing isn't going anywhere - it's simply adapting to improved detection techniques to better target users and increase the payoffs from attacks.
Proofpoint researchers uncover details about an advanced persistent threat against Indian diplomatic and military interests, centered around a remote access Trojan called MSIL/Crimson.
Proofpoint researchers track new campaigns using the not-so-new Nymaim Trojan. But some new twists are making this malware far more troublesome, including distribution via a large email marketing provider instead of the usual botnets.
The Human Factor reveals not just who is clicking what, but how threat actors are using social engineering to get people to perform the work of automated exploits.