CEO Fraud: using allegedly secret transactions as bait
11/30/2016 - Scammers' profits, based on CEO fraud, are rising worldwide. The losses for companies of all kinds and sizes go into the millions! This holiday season is expected to see a peak in attempted new attacks. Even G DATA was recently hit by such an attack, but its employees reacted attentively and confidently against it. Read more about the current case in G DATA's German SecurityBlog.Author: Sabrina Berkenkopf
Why hacking routers is worthwhile
11/29/2016 [UPDATE: 11/30/2016] - Last weekend about 900.000 customers of Deutsche Telekom found themselves without a working internet connection. An attack against the ISP’s customer routers was the root cause for this. We have compiled the most important facts and information for you in this article.Author: Tim Berghoff
Buying presents for Christmas online? Without doubt!
11/24/2016 - Holiday season is about to start and online shopping for Christmas is trending! Our experts forewarn you about current phishing and malware threats in our German G DATA SecurityBlog.Author: Sabrina Berkenkopf
The Rampage of Locky
11/18/2016 [UPDATE: 11/24/2016] - Locky has been a constant in the malware zoo for a considerable time. And while we are aware that there are still victims being hit by the variant sporting the .ODIN extension, in this post we are going to have a look on its statistical data and an in-depth analysis at yet another two later flavors: .SH*T and .THOR. Furthermore, an update to this article takes a look at the recently released...Author: Jaydee Valdez
Analysis: Ursnif - spying on your data since 2007
11/23/2016 - A game of cat and mouse has been going on ever since the first ever malware started circulating in the wild and the first Antivirus appeared on the market. Although it may seem that brand new malware families appear on a daily basis, the truth looks somewhat different. A lot of the malware which is in circulation is a reiteration of something that has existed for quite some time. After all,...Author: Eruel Ramos
The Kings in Your Castle, Pt. #3
11/22/2016 - In the third episode of Marion Marschalek's and Raphael Vinot's series of articles on modern APTs, they will shine some light on the prevalence of Zero-Day vulnerabilities. In reality, the use of Zero-Days is far less common than expected. In fact, APT groups in some cases exploit vulnerabilities which are a couple of years old. On the side of the analysts, they will explain that identical hashes...
The Kings in Your Castle, Pt #2
11/15/2016 - The second part of Marion Marschalek's and Raphael Vinot's article series deals with questions that surround the tools and the data used by analysts. They shine a light on some of the challenges facing analysts when it comes to Indicators of Compromise. While those are easily created and implemented, they can end up being outdated rather quickly. For an effective strategy, other metrics are...Author: Tim Berghoff
It's Educational - On the No 1 Argument for Open Source Ransomware
11/04/2016 - Researchers have published several ransomware projects in the name of education and freedom of knowledge. The question of their usefulness sparks debates among security enthusiasts and researchers since the release of open source ransomware Hidden Tear in August 2015.Author: Karsten Hahn, Tilman Frosch
Microsoft Tech Support Scammers Use Screenlocker Ransomware
11/03/2016 - Microsoft recently published a new study about Tech Support Scams and its impact. Besides the well-known telephone, email and website scams, G DATA experts have encountered screenlocker ransomware in this area. Read more in our German G DATA SecurityBlog.Author: Sabrina Berkenkopf
Drammer: Are hardware vulnerabilities the Achilles heel of Android?
10/28/2016 - Mobile devices, especially smartphones, are a very lucrative target for cyber criminals because they are a fixture of everyday private and working life. Researchers at VUSec Labs, the University of California and Graz University of Technology have succeeded in exploiting a security hole in Android smartphone hardware. The experts have called the attack vector “Deterministic Rowhammer” (Drammer for...Author: Christian Lueg