Cybersecurity

Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
February 10, 2016

Hiding in Plain Sight - Obfuscation Techniques in Phishing Attacks

Proofpoint Staff

Proofpoint researchers analyze multiple techniques for obfuscating phishing landing pages.

February 05, 2016

Vawtrak and UrlZone Banking Trojans Target Japan

Proofpoint Staff

Proofpoint researchers give further insights into recent Vawtrak and UrlZone campaigns in Japan and Spain.

February 03, 2016

Dridex, JavaScript, and Porta Johns

Proofpoint Staff

Proofpoint researchers track a new Dridex campaign with an unusual combination of vectors.

January 28, 2016

Exploring Bergard: Old Malware with New Tricks

Darien Huss

Proofpoint researchers find new malware variants and evidence of emerging threats related to the Bergard Trojan through historical analysis and a deep dive into an ongoing campaign.

January 25, 2016

New Year, More Dridex

Proofpoint Staff

Proofpoint researchers follow a new Dridex infection chain and explore the expanding distribution mechanisms for the malware juggernaut.

January 19, 2016

Updated Blackmoon banking Trojan stays focused on South Korean banking customers

Proofpoint Staff

Proofpoint researchers analyze changes to the South Korea-targeted Blackmoon banking Trojan.

January 14, 2016

An Orthodox Holiday For Some Unorthodox Actors

Christopher Dawson

Even bad actors take holidays and they aren’t just driven by the work schedules of their targets

December 23, 2015

DarkSideLoader: Rogue App Stores Targeting Non-Jailbroken iOS Devices

Proofpoint Staff

Recently, Proofpoint Targeted Attack Protection Mobile Defense discovered apps on iOS devices – that is, iPhones and iPads – that did not match apps in the Apple App Store.   

December 22, 2015

Gootkit banking Trojan jumps the Channel

Proofpoint Staff

First documented in mid-2014, the Gootkit banking Trojan appeared to focus solely on customers from several French banks.This JavaScript-based malware combines web-injects (a la Zeus) and a clever persistence technique to create a robust tool for stealing online banking logins and other credentials from users of infected systems. 

December 16, 2015

Is nothing sacred? Risky mobile apps steal data and spy on users

Proofpoint Staff

Cybercriminals are increasingly targeting mobile users with free mobile apps in order to steal data – and nothing is sacred. Like a social media account with a large following, popular mobile apps give scammers a low-cost way to cast a very wide net.

Pages

Stay Connected
TWITTER @THREATINSIGHT