Email compromise leads to healthcare data breach at Kaiser Permanente

Credit to Author: Christopher Boyd| Date: Wed, 15 Jun 2022 10:30:13 +0000

We take a look at the latest healthcare breach, an email compromise of a healthcare employee and explore the fallout.

The post Email compromise leads to healthcare data breach at Kaiser Permanente appeared first on Malwarebytes Labs.

Read more

The $43 billion Business Email Compromise threat

Credit to Author: Christopher Boyd| Date: Thu, 05 May 2022 15:44:47 +0000

We take a look at the latest FBI report on Business Email Compromise which reveals $43 billion in losses from 2016 to 2021.

The post The $43 billion Business Email Compromise threat appeared first on Malwarebytes Labs.

Read more

Unusual sign-in activity mail goes phishing for Microsoft account holders

Credit to Author: Christopher Boyd| Date: Tue, 01 Mar 2022 09:39:15 +0000

We look at a phishing mail which may cause concern for users of Microsoft services as it claims there’s been a suspicious login from Russia.

The post Unusual sign-in activity mail goes phishing for Microsoft account holders appeared first on Malwarebytes Labs.

Read more

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read more

Ako Ransomware targeting businesses using RaaS

Credit to Author: Shriram Munde| Date: Fri, 24 Jan 2020 11:00:51 +0000

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is…

Read more

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Credit to Author: Anjali Raut| Date: Sat, 02 Nov 2019 12:56:15 +0000

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to look like important one using keywords like invoice, payment, finance, order…

Read more