The top NFT Ethereum-based game Axie infinity, is a Pokemon-like play-to-earn game that lets its users earn SLP (Smooth Love Potion). This potion can be traded as a...
Cyren Security Blog Categories
How Phishers Abuse Hypertext Transfer Protocol Secure (HTTPS) Protocol
What is the first thing that comes to mind when we see sites using HTTPS protocol? Subconsciously we tend to trust these sites presuming that all that we see and/or...
Adobe Cloud Services Phishing: Adobe Spark Scams & More
Threat actors are always on the lookout for inconspicuous ways to execute malicious attacks. One such tactic that has become common is the use of legitimate services as...
Ransomware Attacks Are Here to Stay
Following the highly publicized (and successful) $4M+ ransom of Colonial Pipeline, attacks like these will only get more popular. Indeed this week, the New York Times...
SolarMarker Backdoor Pretends to be Legit PDFescape Installer
The modified installer of legit "PDFescape Desktop Installer" app looks like this: Fake PDFescape Desktop Installer App SHA-256:...
Dissecting a UnionBank Phishing Campaign
We have been seeing email notifications about login attempts to UnionBank online accounts, prompting users to reset their password if they found the login attempts were...
Fake DocuSign Download Page Leads to Hentai Onichan Ransomware
We recently received samples that we suspected were “phishy” in nature, but after analyzing the email attachment a severe threat was exposed. Figure 1.0 Email sample...
A Dridex Phishing Campaign
The “Purchase” themed email is a commonly used subject in phishing campaigns. Threat actors can easily scrape the internet, in other words, specific data is very easily...
Office 365 Phishing Email Campaign Hides Excel Template in HTML
Phishing remains one of the most popular types of corporate attacks in terms of its prevalence, and therefore it is not surprising that attackers are coming up with...