Cisco Talos Blog

July 12, 2018 15:00

Advanced Mobile Malware Campaign in India uses Malicious MDM

Summary Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled devices. At this time, we don't know how the attacker managed

July 3, 2018 06:00

Smoking Guns - Smoke Loader learned new tricks

Smoke Loader is primarily used as a downloader to drop and execute additional malware like ransomware or cryptocurrency miners.

April 21, 2017 14:42

Threat Spotlight: Mighty Morphin Malware Purveyors: Locky Returns Via Necurs

Throughout the majority of 2016, Locky was the dominant ransomware in the threat landscape. It was an early pioneer when it came to using scripting formats Windows hosts would natively handle, like .js, .wsf, and .hta. These scripting formats acted as a vehicle to deliver the pay

November 3, 2016 11:00

Take the RIG Pill: Down the Rabbit Hole

The adversaries are leveraging Gates (e.g. EITest) to redirect the users to their Landing Page. This leads to a chain of redirects, before the victim finally gets on the landing page of the exploit kit.

May 3, 2016 11:15

Threat Spotlight: Spin to Win...Malware

This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau. The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to maliciou

April 20, 2016 12:04

Threat Spotlight: Exploit Kit Goes International Hits 150+ Countries

Overview Talos is constantly monitoring the threat landscape and exploit kits are a constantly evolving component of it. An ongoing goal of Talos is to expose and disrupt these kits to protect the average internet user being targeted and compromised. We were able to gain unprece

April 11, 2016 09:01

Ransomware: Past, Present, and Future

"What's past is prologue." -- William Shakespeare, The Tempest Introduction The rise of ransomware over the past year is an ever growing problem. Businesses often believe that paying the ransom is the most cost effective way of getting their data back - and this

May 4, 2015 04:00

Threat Spotlight: Rombertik - Gazing Past the Smoke, Mirrors, and Trap Doors

This post was authored by Ben Baker and Alex Chiu. Executive Summary Threat actors and security researchers are constantly looking for ways to better detect and evade each other.  As researchers have become more adept and efficient at malware analysis, malware authors have mad

April 27, 2015 04:39

Threat Spotlight: TeslaCrypt - Decrypt It Yourself

This post was authored by: Andrea Allievi, Earl Carter & Emmanuel Tacheau Update 4/28: Windows files recompiled with backward compatibility in Visual Studio 2008 Update 5/8: We've made the source code available via Github here After the takedown of Cryptolocker, we hav