e92plus Blog

Three million wrestling fans at risk after WWE leaves database unprotected

Jul 11, 2017, 08:54 AM Ben Gane

Some companies just make it far too easy for criminals to scoop up their data. Take WWE, for instance. The professional wrestling entertainment company has just been caught with its spandex leotard down, after a security researcher discovered...


Read More

Jayden K Smith's Facebook friendship request - not a hacker, it's a hoax

Jul 11, 2017, 08:40 AM Ben Gane

My wife left me in charge of her iPad today, as I was assigned to "fix a few things on it". It sat untouched on the side of my desk and then suddenly burbled up a couple of very similar Facebook notifications...


Read More

PsExec & WMIC - admin tools, techniques & procedures

Jul 10, 2017, 08:56 AM Ben Gane

As with WannaCry, the what and where parts of the analysis have been thoroughly covered by this point, albeit with some tug-of-war over semantics: whether the malware was released in an unfinished state or what...


Read More

A technical look into the GoldenEye ransomware attack

Jul 10, 2017, 08:53 AM Ben Gane

On January 27th, reports of a rapidly spreading ransomware attack started to emerge from Ukraine. The speed at which critical infrastructure networks were shutting down pointed to a ransomware application with a wormable...


Read More

What Are Advanced Persistent Threats & How To Prevent Them

Jul 10, 2017, 08:47 AM Ben Gane

Financial gain is often the main motivator behind advanced attacks. So, with that in mind, let’s take a closer look at an APT that targeted a Bangladesh bank, whose purpose was to transfer around $951 million into the cybercriminal’s bank accounts...


Read More

The Ivanti Threat Thursday Update for July 6, 2017: Petya, and Beyond

Jul 7, 2017, 10:31 AM Ben Gane

Greetings. The latest Petya ransomware attack is still very much in the news, but it’s not the only issue demanding the attention of IT and cybersecurity leaders and teams. As always, please let me know what you think,...


Read More

PsExec & WMIC – Admin Tools, Techniques, and ProceduresPSEXEC & WMIC – ADMIN TOOLS, TECHNIQUES, AND PROCEDURES

Jul 7, 2017, 09:02 AM Ben Gane

The June 2017 Petya (Petna, Petrwrap, etc.) outbreak injected some much un-needed excitement into an IT sector just starting to come to terms with the implications of the WannaCry outbreak a few weeks beforehand...


Read More

Presumed GoldenEye hackers surface online demanding $260,000 for decryption keys

Jul 7, 2017, 08:52 AM Ben Gane

The hackers behind the GoldenEye/Petya ransomware gave the first signs of life since the outbreak by posting new ransom demands, along with a signature for the malware’s private key, as evidence that they are the ones...


Read More

Something to prove - why the proof of concept needs a second look

Jul 6, 2017, 14:26 PM Ben Gane

We’re living in an age where hackers control the headlines, keeping Security Operations teams constantly on their toes. And, sometimes, a security system reaches end of life or a new threat demands features...


Read More

Ransomware targeting embedded systems? Not that far-fetched

Jul 6, 2017, 14:03 PM Ben Gane

The Internet of Things may consist mostly of new technology, but these new products aren’t the only members of the IoT family. Embedded systems, some created before IoT was even a thing, are often equipped with add-ons for remote access...


Read More
Back
to Top