Tag: Microsoft

Reports linking the Petya malware attacks to Russia-backed hackers may be an early test of a muscular Trump cyber doctrine.

Petya Malware may be an Early Test of Muscular Trump Cyber Doctrine

In-brief: In the hours before the Petya malware began circulating, two high level Trump Administration officials called for a tougher stand against online actors who sow chaos. The question now is how the Administration will react.

The New York Times expose on the hacks of the DNC is a case study in how not to respond to a cyber attack. We talk with Tim Bandos of Digital Guardian about building a cyber threat hunting capability.

Financial Malware, not Ransomware, drives most Cyber Crime

In-brief: data from the firm Symantec shows that financial malware targeting banks – not ransomware- is the most important and oft-used tool in the cyber criminal’s toolbox. 

The payment screen for the Wana Decrypt0r malware which spread widely last week.

Podcast: WannaCry: It’s The Exploits, Stupid and Parsing The Cyber Executive Order

In-brief: We speak  with Sean Dillon of the firm RiskSense, who helped reverse engineer DoublePulsar and EternalBlue, the Windows exploit tools used to help spread the WannaCry ransomware. We also chat with John Dickson of The Denim Group about the impact of President Trump’s Cyber Executive Order. 

A visualization of infections linked to the WannaCry ransomware.  (Image courtesy of MalwareTech.com)

Updated: Fatal Flaw Slows WannaCry Ransomware Spread, but Threats Remain

In-brief: A fatal flaw in its design slowed the spread of WannaCry, a virulent ransomware program that has infected more than 100,000 organizations and individuals globally.

Remote Desktop Protocol hacks affected education and healthcare networks the most, an analysis by Flashpoint revealed.

Analysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top Targets

In-brief: An analysis of 85,000 hacked Remote Desktop Protocol servers from the cyber criminal marketplace xDedic shows that education and healthcare networks were the most often targeted by hackers, who often used brute force password guessing to gain access.