Cybersecurity Special the automotive industry as a target of cyberattacks

Hornetsecurity Blog

Ontvang regelmatig updates uit de wereld van cloudbeveiliging

In onze blog rapporteert het Hornetsecurity-team – met name de experts van het Security Lab – regelmatig over IT-beveiligingsonderwerpen en actuele innovaties en evenementen bij Hornetsecurity.

Clop, Clop! It’s a TA505 HTML malspam analysis

Clop, Clop! It’s a TA505 HTML malspam analysis

In this article Hornetsecurity’s Security Lab outlines one of the current infection chains by the operators behind the Clop ransomware. The outlined infection chain starts from an email with a malicious HTML attachment. This attachment redirects the victim to an XLS document containing the Get2 loader. This loader then installs a remote access trojan (RAT) on the system, which is used to prepare the victims network for the deployment of the Clop ransomware. The goal of the attack is to encrypt as many systems in the victims organization as possible in order to extort the highest possible ransom. To this end, the attackers also threaten to publish stolen data if the ransom is not paid.
QakBot malspam leading to ProLock: Nothing personal just business

QakBot malspam leading to ProLock: Nothing personal just business

FBI and the German federal CERT [1][2] are warning of current QakBot malspam distributing ProLock ransomware. QakBot is spread via email. In the outlined campaign an email with a link to a ZIP archive containing a VBScript is used to download the QakBot Loader onto victim computers. From there the ProLock ransomware can potentially be loaded by the QakBot operators. The ProLock ransomware uses RC6 to encrypt files on the victims computer. It spares the first 8 KiB of all files. It appends a .proLock extension to encrypted files and leaves a ransom note stating that it is “[n]othing personal just business” and instructions on how to pay the ransom. However, the ransomware also deletes specific files ending with .bac or .bak extensions, so victims that pay will still loose those files.
Nieuwe Service: Hornetsecurity lancheert Hornet.email

Nieuwe Service: Hornetsecurity lancheert Hornet.email

Met de 365 Total Protection Suite heeft Hornetsecurity al een volledige beveiligingsservice gelanceerd om e-mail en gegevensbeveiliging van zakelijke Microsoft 365 gebruikers te garanderen. Nu breidt Hornetsecurity zijn portfolio uit met Hornet.email, een cloud-based, beveiligd communicatieplatform waarmee bedrijven extra mailboxen kunnen combineren met Microsoft 365 binnen bestaande domeinen en tenants – of om als een zelfstandige oplossing te gebruiken.
Trickbot Malspam Leveraging Black Lives Matter as Lure

Trickbot Malspam Leveraging Black Lives Matter as Lure

The Hornetsecurity Security Lab has observed a Malspam campaign distribution Trickbot that uses the Black Lives Matter movement as a lure to entice victims to open a malicious attachment. The Trickbot downloader document first injects shellcode into the WINWORD.EXE process. Then from that shellcode spawns a cmd.exe process into which it again injects more of the same shellcode. This cmd.exe process then downloads the Trickbot DLL and executes it via rundll32.exe.
Cybercriminaliteit bedreigt de toekomst van de logistieke sector

Cybercriminaliteit bedreigt de toekomst van de logistieke sector

Als een van ’s werelds grootste en meest succesvolle industrieën wordt de logistieke sector steeds vaker het doelwit van cyberaanvallen. Maar hoe kwetsbaar is het in vergelijking met andere industrieën? Wat zijn de doelwitten van hackers met hun aanvallen op specifieke bedrijven? Aan welke aanvalstechnieken worden de getroffen bedrijven blootgesteld? In de “Cybersecurity Special – Cybercrime bedreigt de toekomst van de logistieke sector” geven de veiligheidsexperts van Hornetsecurity antwoord op deze vragen…
A Journey Through the History of Cryptography – Part 3

A Journey Through the History of Cryptography – Part 3

Our journey through the history of cryptography is coming to an end, but we still have a few last stations ahead of us. First we dealt with symmetric encryption and the encryption methods of Data Encryption Standard (DES) and Advanced Encryption Standard (AES), and in the last blog we introduced asymmetric encryption. In our final piece of the Cryptography triology, we will dive deeper into asymmetric encryption. Attack techniques such as man-in-the-middle attacks and brute force attacks will be examined. Finally, we will present a wide view into the future – keyword: quantum cryptography…

Hornet News ondertekenen

Cyberthreat Report: Nu downloaden