Cisco Talos Blog

April 9, 2019 13:45

Gustuff banking botnet targets Australia

EXECUTIVE SUMMARY Cisco Talos has uncovered a new Android-based campaign targeting Australian financial institutions. As the investigation progressed, Talos came to understand that this campaign was associated with the "ChristinaMorrow" text message spam scam previousl

February 26, 2019 13:56

Cisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters

Christopher Evans of Cisco Talos conducted the research for this post. EXECUTIVE SUMMARY Cisco Talos warns users that they need to keep a close eye on unsecured Elasticsearch clusters. We have recently observed a spike in attacks from multiple threat actors targeting these clu

January 30, 2019 14:19

Fake Cisco Job Posting Targets Korean Candidates

Edmund Brumaghin and Paul Rascagneres authored this post, with contributions from Jungsoo An. Executive summary   Cisco Talos recently observed a targeted malware campaign being leveraged in an attempt to compromise specific organizations. The infection vector associated with

January 24, 2019 13:39

Cisco AMP tracks new campaign that delivers Ursnif

Talos continues to see Ursnif in the wild. In this most recent example, we blocked it before it could do any damage to the target.

July 12, 2018 15:00

Advanced Mobile Malware Campaign in India uses Malicious MDM

Summary Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled devices. At this time, we don't know how the attacker managed

July 3, 2018 06:00

Smoking Guns - Smoke Loader learned new tricks

Smoke Loader is primarily used as a downloader to drop and execute additional malware like ransomware or cryptocurrency miners.

April 21, 2017 14:42

Threat Spotlight: Mighty Morphin Malware Purveyors: Locky Returns Via Necurs

Throughout the majority of 2016, Locky was the dominant ransomware in the threat landscape. It was an early pioneer when it came to using scripting formats Windows hosts would natively handle, like .js, .wsf, and .hta. These scripting formats acted as a vehicle to deliver the pay

November 3, 2016 11:00

Take the RIG Pill: Down the Rabbit Hole

The adversaries are leveraging Gates (e.g. EITest) to redirect the users to their Landing Page. This leads to a chain of redirects, before the victim finally gets on the landing page of the exploit kit.

May 3, 2016 11:15

Threat Spotlight: Spin to Win...Malware

This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau. The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to maliciou