To Deliver Malware, Attackers Use the Phone
Underground call center services are aiding threat actors in delivering malware through callback phishing and negotiating ransoms. Here's a briefing about different attack scenarios and tips for defense.
Cybersecurity Is Every Employees’ Responsibility
Cybersecurity Awareness Month is a chance to remind everyone, including employees and customers, that there are simple, effective ways to keep yourself safe online, protect your personal data, and help secure our world.
Are Telegram's New Policies Spooking Cybercriminals?
Telegram will now divulge IP addresses and phone numbers in response to valid legal requests. Some cybercriminals are planning to leave Telegram. We assess the impacts of this on visibility into the cybercriminal underground.
Detecting Malware Abusing Google for Command-and-Control
Malware often abuses cloud services for command-and-control. It's not a new technique but has been used recently by the Voldemort malware. In this post, we describe two different threat hunts that can detect this activity.
Intel 471 Earns Frost & Sullivan’s 2024 Enabling Technology Leadership Award
Leading industry analyst recognizes Intel 471 for world-class performance as leading global CTI and threat hunt provider for driving growth and impact of operationalized threat intelligence .
Why Russia is a Hotbed of Cybercrime
In this Studio 471, Alec Jackson discusses how deep, institutional corruption ties Russian IT professionals, organized criminal groups and the state together and how Russia leverages this to its advantage.
A Look at the Residential Proxy Market
Cybercriminals proxy connections through residential IP addresses to avoid geoblocks and other security controls. Here's a look at the thriving market for this underground service.
Threat Hunting Case Study: Uncovering FIN7
FIN7 is one of the most persistent and capable financially motivated threat actor groups. Here's how to threat hunt for signs of a FIN7 intrusion.
Hunting for RansomHub and Antivirus Killers
Threat actors always seek new techniques and tools that make it easier to infiltrate an environment, persist, and perform malicious activity. One of the obstacles to this is antivirus or Endpoint Detection and Response (EDR)....
A Briefing on Malware Crypting Services
Crypting malware hides it from security tools. There’s rising demand for crypter services. Here’s a look at this underground market.