Cisco Talos Intelligence Blog

  • Blog
  • Podcasts
Cisco Systems, Inc.
Cisco Talos Blog
  • Software
  • Vulnerability Information
    • Vulnerability Information

    • Vulnerability Reports
    • Microsoft Advisories
  • Reputation Center
    • Reputation Center

    • IP & Domain Reputation
    • Talos File Reputation
    • Secure Endpoint Naming Conventions
    • Intelligence Categories
  • Library
  • Support
  • Incident Response
  • Blog
  • Podcasts
    • Podcasts

    • Beers with Talos
    • Talos Takes
  • Careers
  • About

TeleGrab - Grizzly Attacks on Secure Messaging

By Vitor Ventura

Wednesday, May 16, 2018 13:05
Infostealer
Share this post

Related Content

Get a Loda This: LodaRAT meets new friends

November 17, 2022 08:11

* LodaRAT samples were deployed alongside other malware families, including RedLine and Neshta. * Cisco Talos identified several variants and altered versions of LodaRAT with updated functionality have been seen in the wild. * Changes in these LodaRAT variants include new functionality allowing proliferation to attached removable storage, a new string encoding algorithm

Neurevt trojan takes aim at Mexican users

August 17, 2021 08:08

By Chetan Raghuprasad, with contributions from Vanja Svajcer. News summary * Cisco Talos discovered a new version of the Neurevt trojan with spyware and backdoor capabilities in June 2021 using Cisco Secure Endpoint product telemetry. * This version of Neurevt appears to target users of Mexican financial institutions. * This threat demonstrates several

Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks

July 1, 2020 11:07

By Nick Biasini, Edmund Brumaghin and Mariano Graziano. Threat summary * Attackers are actively distributing the Valak malware family around the globe, with enterprises, in particular, being targeted. * These campaigns make use of existing email threads from compromised accounts to greatly increase success. * The additional use of password-protected ZIP files can

  • Software
  • Reputation Center
  • Vulnerability Inforamtion
  • Microsoft Advisory Snort Rules
  • Incident Response
  • Secure Endpoint Naming Conventions
  • Talos File Reputation
  • Library
  • Support Communities
  • About
  • Careers
  • Talos Blog
  • Threat Source newsletters
  • Beers with Talos Podcast
  • Talos Takes Podcast
Connect with us
  • Follow us on Twitter
  • Watch our informational videos on YouTube
  • Connect with us on LinkedIn
Cisco Security

© Cisco Systems, Inc. and/or its affiliates. All rights reserved. View our Privacy Policy