Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
August 14, 2017

Threat actor goes on a Chrome extension hijacking spree


Proofpoint researchers track a number of Chrome extensions compromised for stealing credentials and hijacking web traffic.

August 10, 2017

Q2 Threat Report: High-volume malicious email campaigns, “ransomworms” make for eventful spring

Proofpoint Staff

Proofpoint researchers track the trends that shaped the threat landscape in the second quarter of 2017.

July 31, 2017

FIN7/Carbanak threat actor unleashes Bateleur JScript backdoor

Matthew Mesa, Darien Huss

Proofpoint researchers track changes to macros and a new Jscript backdoor being used by the FIN7 threat actor.

July 27, 2017

Backdoored Litecoin Wallet Spread via Typosquatted Domains

Proofpoint Staff

Proofpoint researchers track XKey keylogger malware distributed via typosquatted clones of the Litecoin cryptocurrency website and backdoored versions of the app.

July 24, 2017

Silver lining: Google OAuth worm leads to Proofpoint discovery and Google mitigation

Proofpoint Staff

Since at least 2011 [1] [2], information security researchers have attempted to raise awareness about the ease with which attackers could create seemingly legitimate apps and then trick users into granting them access to email and cloud service accounts.

July 13, 2017

Meet Ovidiy Stealer: Bringing credential theft to the masses

Proofpoint Staff

Proofpoint researchers analyze a previously undocumented stealer called Ovidiy Stealer. Lightweight, efficient, and with attractive pricing and marketing, Ovidiy Stealer makes it easy for would-be criminals to make the leap into credential theft.

June 27, 2017

Pyramid Schemes Go High Tech with Affiliate Spam and Malware Affiliates

Proofpoint Staff

Proofpoint researchers examine how the affiliate marketing model drives both spam and malware distribution.

June 20, 2017

AdGholas Malvertising Campaign Using Astrum EK to Deliver Mole Ransomware


Proofpoint researchers track recent AdGholas activity with colleagues from the advertising and security industries after ransomware activity in the UK set off red flags.

June 12, 2017

Follow the Money - Phishing Schemes Go After Cryptocurrency

Proofpoint Staff

Proofpoint researchers examine phishing templates used to steal cryptocurrencies and related credentials from users.

June 05, 2017

Exploiting the Human Factor - Proofpoint Releases Human Factor 2017 Report

Proofpoint Staff

Proofpoint researchers look ahead at the changing threat landscape and the increasing tendency for threat actors to target people rather than chase the latest exploits.


Stay Connected