Breaking the money mule’s back

Breaking the money mule’s back

In any bank fraud scheme, the criminals need to move funds to clean accounts or cash them out, and that means laundering. To cover their tracks, they transfer funds, first to money mules and thence somewhere else. At RSA Conference 2021, representatives of several...
Google Docs used for Office 365 credential phishing

Google Docs used for Office 365 credential phishing

Phishers are using Google online services to take over Microsoft online service accounts. Since the onset of the COVID-19 pandemic, many companies have moved much of their workflows online and learned to use new collaboration tools. In particular, Microsoft’s Office...
Five signs ransomware is becoming an industry

Five signs ransomware is becoming an industry

With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be. Not content with its innovative victim-pressuring tactics, the DarkSide ransomware gang has forged ahead with...
Ransomware in a virtual environment

Ransomware in a virtual environment

Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware. Although it significantly reduces some cyberthreat risks, virtualization is no more a panacea than any single other practice. A ransomware attack can still...
So, you’ve been encrypted

So, you’ve been encrypted

How to minimize the consequences of a corporate ransomware attack. You’ve read our thousand and one articles on guarding your network from every threat under the sun. But sometimes, despite all precautions, an infection gets in. Now is the time for cool heads and...