The Storm After the Calm: Proofpoint Q3 Threat Summary Tracks Locky Ransomware, Social Threats, BEC, and More
Proofpoint researchers follow trends in email, mobile, and social threats throughout the third quarter of 2016.
Peas in a pod: Microsoft patches CVE-2016-3298, a second information disclosure zero-day used in malvertising campaigns and the Neutrino Exploit Kit
Proofpoint researchers discovered and reported another information disclosure vulnerability associated with the AdGholas malvertising campaign and the Neutrino exploit kit used to filter researchers and delay exposing infection chains.
Proofpoint researchers discover a new technique for delivering malware via document attachments that leverages the Windows Troubleshooting Platform.
Proofpoint researchers identify a new ransomware variant known as Hades Locker sent via the same spam botnet as recent CryptFile2 and MarsJoke campaigns.
Proofpoint researchers uncover a new ransomware variant called MarsJoke in a large campaign targeting government and educational institutions.
Proofpoint researchers track new tools and techniques for evading sandboxes and improving targeting while an actor distributes personalized lures and the Ursnif banking Trojan to Australian targets.
A newly patched zero-day vulnerability discovered by Proofpoint researchers demonstrates how threat actors are increasingly filtering out researchers and sandboxes in their attacks.
Proofpoint researchers track a phishing campaign that demonstrates far more sophistication than the vanilla financial and credential phishing attempts with which most users are familiar.
In early 2016, Proofpoint researchers identified a new form of social media-based phishing attack, called angler phishing.
Proofpoint researchers track recent significant updates including Tor network and P2P communications in one of the most active Ursnif variants exploring campaigns across multiple geographies.