Proofpoint researchers track recent significant updates including Tor network and P2P communications in one of the most active Ursnif variants exploring campaigns across multiple geographies.
Proofpoint researchers have been tracking numerous small Dridex campaigns over the past few months, as well as a mid-sized campaign this week that point not to the displacement of Dridex by Locky but rather far more targeted distribution of the infamous banking Trojan, as well as potential impact in new geographies.
Proofpoint researchers track a large 2-day campaign employing the Zeus Panda banking Trojan to target banks in Europe and Australia, international online payment systems, and, interestingly, UK online casinos.
Proofpoint researchers take a closer look at current trends in malicious email messages and spam related to the upcoming election.
Proofpoint researchers track an ongoing ransomware campaign after first discovering the variant, known as CryptFIle2, in April.
Massive AdGholas Malvertising Campaigns Use Steganography and File Whitelisting to Hide in Plain Sight
Proofpoint and Trend Micro researchers collaborated to detect and analyze a sophisticated, previously undocumented malvertising campaign that exposed millions of users every day to attacks that employed steganography and multi-layered filtering.
Proofpoint researchers discovered a new delivery mechanism for malware - PayPal money request messages with both a link to Chthonic and a socially engineered request for $100.
For the first time since Proofpoint researchers discovered CryptXXX, the ransomware is being distributed via malicious documents attached to email messages.
Proofpoint researchers discover a cloned Pokemon GO Android APK backdoored with the malicious remote access tool (RAT) DroidJack.