e92plus Blog

PsExec & WMIC – Admin Tools, Techniques, and ProceduresPSEXEC & WMIC – ADMIN TOOLS, TECHNIQUES, AND PROCEDURES

Sep 18, 2017, 15:07 PM Ben Gane

The June 2017 Petya (Petna, Petrwrap, etc.) outbreak injected some much un-needed excitement into an IT sector just starting to come to terms with the implications of the WannaCry outbreak a few weeks beforehand...


Read More

PsExec & WMIC - admin tools, techniques & procedures

Sep 18, 2017, 15:06 PM Ben Gane

As with WannaCry, the what and where parts of the analysis have been thoroughly covered by this point, albeit with some tug-of-war over semantics: whether the malware was released in an unfinished state or what...


Read More

ProMediads Malvertising and Sundown-Pirate Exploit Kit Combo Drops Ransomware and Info Stealer

Sep 18, 2017, 15:06 PM Ben Gane

We’ve uncovered a new exploit kit in the wild through a malvertising campaign we’ve dubbed “ProMediads”. We call this new exploit kit Sundown-Pirate, as it’s indeed a bootleg of its precursors and actually named so by its back panel...


Read More

Ransomware payments total $25 million, Google says

Sep 18, 2017, 15:06 PM Ben Gane

Researchers at Google, Chainalysis, UC San Diego and the NYU Tandon School of Engineering have joined forces to learn how much money victims of ransomware – malware that holds a computer’s content hostage...


Read More

Protecting Your Small Business From WannaCry

Sep 18, 2017, 15:05 PM Ben Gane

May 12, 2017 saw the world’s first ever worm-based ransomware attack, WannaCry. Typically ransomware spreads via email as spam and phishing attacks, and relies on human intervention to initiate the infection. However, WannaCry is different in that it...


Read More

Presumed GoldenEye hackers surface online demanding $260,000 for decryption keys

Sep 18, 2017, 15:05 PM Ben Gane

The hackers behind the GoldenEye/Petya ransomware gave the first signs of life since the outbreak by posting new ransom demands, along with a signature for the malware’s private key, as evidence that they are the ones...


Read More

Positive Technologies launches PT VIP Protect to allow mobile operators to safeguard high-profile figures from targeted phone hacks

Sep 18, 2017, 15:04 PM Ben Gane

Cyber security company Positive Technologies has today launched PT VIP Protect, a technology designed to keep sensitive targets safe from the current and evolving threats from mobile phone hacking. Key business executives, celebrities, and other high-profile individuals...


Read More

Playpen case dismissed; FBI unwilling to disclose hack methods

Sep 18, 2017, 15:04 PM Ben Gane

Playpen, “the largest remaining known child pornography hidden service in the world” that exploited extreme child abuse, was shut down by the FBI in 2015, but only after the service ran for 12 days...


Read More

Playing cat & mouse: introducing the Felismus malware

Sep 18, 2017, 15:04 PM Ben Gane

For the past several weeks, Forcepoint Security Labs have been tracking a seemingly low-profile piece of malware which piqued our interest for a number of reasons: few samples appear to be available in the wild; there is no previous documentation...


Read More

Phishing: A Main Concern for Enterprise Security

Sep 18, 2017, 15:04 PM Ben Gane

IT leaders have an array of considerations they must factor into company security planning, not the least of which include the most current threats. Armed with knowledge about the most pressing IT protection pain points...


Read More
Back
to Top