Proofpoint researchers track new tools and techniques for evading sandboxes and improving targeting while an actor distributes personalized lures and the Ursnif banking Trojan to Australian targets.
A newly patched zero-day vulnerability discovered by Proofpoint researchers demonstrates how threat actors are increasingly filtering out researchers and sandboxes in their attacks.
Proofpoint researchers track a phishing campaign that demonstrates far more sophistication than the vanilla financial and credential phishing attempts with which most users are familiar.
In early 2016, Proofpoint researchers identified a new form of social media-based phishing attack, called angler phishing.
Proofpoint researchers track recent significant updates including Tor network and P2P communications in one of the most active Ursnif variants exploring campaigns across multiple geographies.
Proofpoint researchers have been tracking numerous small Dridex campaigns over the past few months, as well as a mid-sized campaign this week that point not to the displacement of Dridex by Locky but rather far more targeted distribution of the infamous banking Trojan, as well as potential impact in new geographies.
Proofpoint researchers track a large 2-day campaign employing the Zeus Panda banking Trojan to target banks in Europe and Australia, international online payment systems, and, interestingly, UK online casinos.
Proofpoint researchers take a closer look at current trends in malicious email messages and spam related to the upcoming election.
Proofpoint researchers track an ongoing ransomware campaign after first discovering the variant, known as CryptFIle2, in April.
Massive AdGholas Malvertising Campaigns Use Steganography and File Whitelisting to Hide in Plain Sight
Proofpoint and Trend Micro researchers collaborated to detect and analyze a sophisticated, previously undocumented malvertising campaign that exposed millions of users every day to attacks that employed steganography and multi-layered filtering.