By Thom VanHorn, Sr. Director of Marketing at CounterTack -
The Super Bowl is only 5 days away. Tom Brady and Bill Belichick are going for their record sixth victory in the big game. If you’re not from New England, you’re probably rooting against the Patriots. But if you are from New England…like I am, you’re no doubt hoping for them to cement their reputations as the greatest coach and quarterback of all time 😊
No matter who you are supporting, there is one group that we can all agree to root against – the hackers and criminals who use major events to perpetrate cyber attacks. Like most major events, the Super Bowl has historically resulted in an increase in attempts to defraud the public. Phishing schemes increase, rogue Web sites appear, and hackers feast. So as sports fans who will be visiting Super Bowl related Web sites – or maybe event journeying to Minneapolis, now is a good time to revisit common cyber threats and take proactive action to minimize their risks.
Let’s look at 3 common cyber threats that typically accompany events like the Super Bowl.
Mike Davis, CTO of CounterTack – As 2018 rapidly approaches, there is one thing we know for certain – cybersecurity will continue to dominate business, technology and mainstream media. The words “ransomware” “phishing” and “crypto miner” will be included in everyday conversations regardless of age, career or nationality. No longer are these terms confined to those in IT. The following are my top three cybersecurity predictions for 2018.
Topics: Predictions, malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, MSSP, IoT, advanced attacks, crypto miner, MDR, internet of things, crypto currency, bitcoin, fileless, zero day
This week, CounterTack announced a Series D round of financing. This round of funding is led by new CounterTack investor Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP NS2 ™), also a new investor in CounterTack.
Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, endpoint security solution, memory analysis
The WannaCry ransomware started to hit companies worldwide this past Friday, setting off a wave a panic about what to do about it. The reality is this attack will continue to proliferate, and it will likely continue to command attention from CISOs to the boardroom to the media for the upcoming weeks. The attack was first reported to have started to hit companies in Europe and Asia this past Friday, and so far to-date, over 200,000 systems in 150 countries.
It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.
CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.
Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis
You can’t read the news these days without being blasted with yet another Ransomware story. Almost daily, there seems to be a new variant, a new name, and inevitably, new victims. The rise of Ransomware attacks shouldn’t come as a surprise, since its execution is quite simple and the demands on the victims are not onerous.Ransomware is not like an APT (Advanced Persistent Threat) - there is no need for long-term stealth operation, no need to explore the victim’s networks and resources, no need to steal credentials and no need to quietly and patiently exfiltrate sensitive data. With Ransomware, an exploit kit opens the door, and BANG, there it is, your PC is displaying a ransom note with detailed instructions on how to pay.