- In the spotlight this week: Microsoft has released a patch addressing a critical vulnerability that affects Remote Desktop Services on several legacy Windows operating systems. The flaw, referred as CVE-2019-0708, is particularly dangerous because it is “pre-authenticated” and does not require user interaction, meaning it could facilitate a widespread attack of a similar scale to the disruptive “WCry” campaign of May 2017.
- Highlights from the week include: A campaign likely conducted by the “MuddyWater” threat group that has demonstrated new obfuscation techniques, the continued development of the “Trickbot” trojan’s anti-detection capabilities in a new campaign adopting URL redirection tactics, and the deletion of over 12,000 MongoDB databases by the threat actor “Unistellar” as part of an extortion campaign.
Error - something went wrong!
Weekly Intelligence Summary 23 May - 30 May 2019
In the spotlight this week: First identified in April 2019, a new version of the malware loader “JasperLoad...
Error - something went wrong!
Most Recent Flipbooks
Weekly Intelligence Summary 21 Feb 2020
With the Tokyo 2020 Olympic Games fast approaching, the cyber security concerns and evolving attack methods are already taking centre stage of threat intelligence discussions
Weekly Intelligence Summary 14 Feb 2020
A recently discovered campaign has used the legitimate storage services of BitBucket to facilitate malware distribution and increase the perceived trust between an unknown threat actor and a targeted
Weekly Intelligence Summary 07 Feb 2020
The recent disclosure of a vulnerability in Citrix devices was quickly followed by multiple exploitations before patches were introduced, reflecting the danger of announcing a critical vulnerability w
Weekly Intelligence Summary 31 Jan 2020
The “Fractured Statue” cyber-threat campaign of 2019 has highlighted the difficulties in naming perpetrators based on overlapping tools and tactics. The campaign, carried out over four months and targ
Weekly Intelligence Summary 24 Jan 2020
During the past 12 months, Digital Shadows has observed a rise in “mobile malware”―the use of malware targeting mobile devices/operating systems (OS)―as well as legitimate apps used maliciously.
Weekly Intelligence Summary 17 Jan 2020
The cyber-extortion landscape has shown real signs of strength and advancement in the past three months...
Weekly Intelligence Summary 10 Jan 2020
In the spotlight this week: Iranian cyber response neither impossible nor guaranteed
Weekly Intelligence Summary 12 Dec - 19 Dec 2019
Despite a decline in overall exploit kit activity during 2018 and 2019, several new variants have emerged with new techniques and a geographical focus, making them likely to retain their threatening p
Weekly Intelligence Summary 05 Dec - 12 Dec 2019
“Lazarus Group” has been linked to a new trojanized Mac OS X application, demonstrating the threat group’s preference for employing OS X malware over the past two years.
Weekly Intelligence Summary 28 Nov - 05 Dec 2019
The Digital Shadows Intelligence Team discusses the risks of information exposure by Internet users, challenging contemporary thinking about standard security practices.
Weekly Intelligence Summary 21 Nov - 28 Nov 2019
In the spotlight this week is a technique that enables the bypass of security products to initiate ransomware infections.
Weekly Intelligence Summary 14 Nov - 21 Nov 2019
Digital Shadows reviewed nation-state–linked advanced persistent threat (APT) activity in 2019, and highlighted several trends. Some are likely to continue into 2020, and will be supplemented by ...
Weekly Intelligence Summary 07 Nov - 14 Nov 2019
Multiple reports of successful ransomware attacks have highlighted the risk to organizations of all sizes but, despite the media attention, other extortion tactics are being overlooked.
Weekly Intelligence Summary 31 Oct - 07 Nov 2019
A string of data breach incidents affecting perceptively smaller organizations this week has outlined the need for all companies, regardless of size, to take a proactive security stance in preference
Weekly Intelligence Summary 24 Oct - 31 Oct 2019
In the spotlight this week: A card skimming operation targeted the online retailer First Aid Beauty and evaded notice for months.
Weekly Intelligence Summary 17 Oct - 24 Oct 2019
In the spotlight this week: Russia-linked threat group “Turla” was reported to be using cyber-attack tools associated with Iran-linked threat group “APT34”, in conjunction with Turla’s own tools.
Weekly Intelligence Summary 10 Oct - 17 Oct 2019
In the spotlight this week is the “Simjacker” exploit, publicly disclosed in September 2019 and now potentially affecting entities across 29 countries.
Weekly Intelligence Summary 03 Oct - 10 Oct 2019
In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.
Weekly Intelligence Summary 26 Sep - 03 Oct 2019
In the spotlight this week is a variety of new attack methods demonstrated by “Magecart Five”. The threat group is probably testing them out, and will highly likely implement the most successful metho
Weekly Intelligence Summary 19 Sep - 26 Sep 2019