Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor
During a recent client investigation, Trustwave SpiderLabs found a malicious version of the ...
Read MoreSign up to receive the latest security news and trends straight to your inbox from Trustwave.
During a recent client investigation, Trustwave SpiderLabs found a malicious version of the ...
Read MoreJust weeks after Trustwave SpiderLabs reported on the Greatness phishing-as-a-service (PaaS) ...
Read MoreTrustwave has observed a surge in attacks exploiting vulnerabilities in Apache ActiveMQ hosts. In ...
Read MoreIn the ever-evolving landscape of malware threats, threat actors are continually creating new ...
Read MoreIntroduction Recently, we’ve seen a noticeable surge in malware cases linked to a malicious payload ...
Read MoreIntroduction This past month, Trustwave SpiderLabs observed that HTML (Hypertext Markup Language) ...
Read MoreIn this blog, we take an in-depth technical look at Pillowmint malware samples received from our ...
Read MoreA recent blog by Didier Steven’s showed how malicious Excel 4 macros can be stored in OOXML (Office ...
Read MoreAs we mentioned in our earlier blog, Azorult is very popular in the underground hacking forum. ...
Read MoreIn this blog series, we dive into an information stealing Trojan called Azorult that we analyzed ...
Read MoreMagecart is the name given to notorious groups of hackers that target online shopping carts, ...
Read MoreOver five years ago, we published a blog detailing how a webshell’s backdoor code was hidden in an ...
Read MoreLast week, one of my SpiderLabs colleagues was working on a PCI forensic triage for a website. ...
Read MoreDuring Thanksgiving week, we noticed this quite unusual XML-format MS Office Document file:
Read More(Analysis by Rodel Mendrez and Lloyd Macrohon)
Read More(Contributor: Dr. Fahim Abbasi and Phil Hay)
Read MoreLike good old Microsoft Office Macros, Compiled HTML (CHM) Help files have been utilized by malware ...
Read MoreA couple of weeks ago, we observed the Necurs botnet distributing a new malware spam campaign with ...
Read MoreMore than four years ago, we published a series of blogs discussing in-depth analysis of Alina ...
Read MoreBad guys are getting quite creative trying to evade spam filters and antivirus scanners. Last week, ...
Read MoreEmail As Infection Vector
Read MoreIt all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam ...
Read MoreWe are currently seeing extraordinarily huge volumes of JavaScript attachments being spammed out, ...
Read MoreRecently we've observed a massive uptick of malicious spam with JavaScript attachments with an ...
Read More***UPDATE as of September 28, 2015 - see the bottom of this post for removal instructions***
Read MoreA couple of months ago we observed an influx of XML spam attachments that were actually Office ...
Read More