The bad, worse and the horrible by Gunnar Guðmundsson and Axel Marinho Guðmundsson Introduction In this article, we look at a malware payload from an exploited...
Cyren Security Blog Categories
Email Hijacking Delivers Qakbot Malware
by Dexter To and Maharlito Aquino Introduction Originally a banking Trojan that existed in the wild as early as 2007, Qakbot (or QBot) is a pioneer of malware as a...
Example Analysis of Multi-Component Malware
by Kervin Alintanahin Recently, we have received an increase in the number of malicious email samples with password-protected attachments. The recent waves of attacks...
The Resurgence of Emotet
by Kervin Alintanahim Password Protected Docs One of the most recent Emotet samples we received were emails with password protected attachments. Although the malicious...
Malicious Excel Add-in Variant Delivers Malware
By Floser Bacurio Jr XLL is an Excel Add-in extension file that provides ways to use third-party tools and functions that are not available in Microsoft Excel. It is...
Office 365 Phishing, BEC, & Ransomware Survey Highlights
by Max Avory Reading a complete report is not for everyone. If that includes you, here are the key takeaways from the 2022 Osterman report on Phishing, BEC, and...
Crypter Malware: A Deep Dive Into NSIS-Based Crypters
By Floser Bacurio Jr We have been observing that malware is being distributed via NSIS-based crypter. Malware such as FormBook, AgentTesla, GULoader, just to name a...
What is Spyware?
Spyware is a type of malicious software that enters your computer or mobile device without consent in order to gain access to your personal information and data and...
Trick or Treat: Ransomware or The Story Without a Happy Ending
by Ira Chernous This isn’t a story of Halloween costumes and candy. It’s a story about a cyberattack in which the victim always pays for the trick. This type of story...