PhishINvite with Malicious ICS Files

In an earlier blog entitled “Phishing in the Cloud”, we outlined that threat actors are actively ...

Read More

Adventures in ATM Hacking

Intro Before this pandemic, Neil Burrows and myself (Bruno Oliveira) from Trustwave's SpiderLabs ...

Read More

GoldenSpy: Chapter Two – The Uninstaller 

On June 25, 2020 Trustwave SpiderLabs published research showing that the Intelligent Tax software, ...

Read More

The Golden Tax Department and the Emergence of GoldenSpy Malware

Trustwave SpiderLabs has discovered a new malware family, dubbed GoldenSpy, embedded in tax payment ...

Read More

Pillowmint: FIN7’s Monkey Thief

In this blog, we take an in-depth technical look at Pillowmint malware samples received from our ...

Read More

Copy-Paste Threat Actor in the Asia Pacific Region

Summary Australian Prime Minister Australian Prime Minister Scott Morrison announced today that ...

Read More

Cisco WebEx Memory for the Taking: CVE-2020-3347

Overview Due to the global pandemic of COVID-19, there’s been an explosion of video conferencing ...

Read More

TrickBot Disguised as COVID-19 Map

Cybercriminals are continuously exploiting the Coronavirus (COVID-19) pandemic. In our quest to ...

Read More

Patch Tuesday, June 2020

June's Patch Tuesday has crept upon us and while our minds may be elsewhere, the need to keep our ...

Read More

Compromising Android Applications with Intent Manipulation

As a mobile app tester, I have encountered numerous varied vulnerabilities. During one of my mobile ...

Read More

System Takeover Through New SAP ASE Vulnerabilities

For the last several years there have been relatively few security patches for SAP Adaptive Server ...

Read More

Securing SSH: What To Do and What Not To Do

An Uptick in Activity Over the last week we've seen the compromise of a number of supercomputers ...

Read More

Phishing in a Bucket: Utilizing Google Firebase Storage

Credential phishing is a real threat that's targeting organizations globally. Threat actors are ...

Read More

Vaccine for COVID-19 and Other Scams on the Dark Web

Our attempts to investigate the underground and document some of what’s going on in the Dark Web ...

Read More

Azure Web App Service For Offensive Operations

In this blog, I will be covering how to use Azure App Services for offensive purposes. What is ...

Read More

Patch Tuesday, May 2020

May's Patch Tuesday includes patches for 111 unique CVEs. Of those CVEs 17 are rated "Critical" and ...

Read More

Work From Home: The New New and What To Do

Here at SpiderLabs, we take the security of all our clients extremely seriously. While the attacks ...

Read More

Attacking SCADA: Vulnerabilities in Schneider Electric SoMachine and M221 PLC (CVE-2017-6034 and CVE-2020-7489)

Introduction SCADA/OT security has been a growing concern for quite some time. This technology ...

Read More

Combatting Social Engineering Is Not Just A Compliance Requirement

Having a well designed and tested social engineering training program for an organization is an ...

Read More

Excel Malspam: Password Protected … Not!

Early March of this year, we blogged about multiple malspam campaigns utilizing Excel 4.0 Macros in ...

Read More

COVID-19 Themed BEC Scams

Business email compromise (BEC) also known as CEO fraud has undoubtedly become the biggest Internet ...

Read More

Patch Tuesday, April 2020

April's Patch Tuesday is here and Microsoft is patching 113 CVEs this month. Eighteen of these are ...

Read More

An In-depth Look at MailTo Ransomware, Part Three of Three

Overview In Part One of this series, we discussed how MailTo ransomware installs and configures ...

Read More

An In-depth Look at MailTo Ransomware, Part Two of Three

Overview In Part One of this series, we discussed how MailTo ransomware installs itself on the ...

Read More

Windows Debugging and Exploiting Part 5 SMBGhost CVE-2020-0796 Technical Review

Introduction Hi everyone, how are you? I know the times are strange but we should fight together, ...

Read More

An In-depth Look at MailTo Ransomware, Part One of Three

In February, an Australian transportation company called Toll Group was hit by a ransomware attack ...

Read More

COVID-19 Malspam Activity Ramps Up

Back in February, we reported on two Coronavirus-themed phishing emails. But just as the real virus ...

Read More

Would You Exchange Your Security for a Gift Card?

UPDATED March 27, 2020

Read More