SEARCH
CONTACT US
LASTLINE BLOG
SCHEDULE A DEMO
CONTACT US
SCHEDULE A DEMO
Logo Logo Logo Logo Logo
  • Solutions
    • Lastline Defender
      • Network
      • Email
      • Cloud
      • IoT
    • Lastline Analyst
    • Lastline Detonator
  • Use Cases
    • Security Challenges
      • Secure Public Cloud Workloads
      • Accelerate Threat Response
      • Detect Lateral Movement
      • Prevent Intrusions
      • Block Unauthorized Access
      • Prevent Data Exfiltration
      • Secure Any Email System
    • Industries
      • Financial Services
      • Telecommunications
      • Online Gambling
  • Why Lastline
  • Resources
  • Partnerships
    • Channel Partnerships
    • Technology Alliance Partnerships
    • Strategic Partnerships
    • Partner With Lastline
    • Partner Portal
  • Labs
    • Labs Blog
    • Labs Research Papers
  • Company
    • Threat Intelligence
    • Mission & Principles
    • Management Team
    • Board & Investors
    • News & Events
      • Media Coverage
      • Press Releases
      • Events
    • Lastline Blog
    • Awards
    • Careers
    • Contact
  • Solutions
    • Lastline Defender
      • Network
      • Email
      • Cloud
      • IoT
    • Lastline Analyst
    • Lastline Detonator
  • Use Cases
    • Security Challenges
      • Secure Public Cloud Workloads
      • Accelerate Threat Response
      • Detect Lateral Movement
      • Prevent Intrusions
      • Block Unauthorized Access
      • Prevent Data Exfiltration
      • Secure Any Email System
    • Industries
      • Financial Services
      • Telecommunications
      • Online Gambling
  • Why Lastline
  • Resources
  • Partnerships
    • Channel Partnerships
    • Technology Alliance Partnerships
    • Strategic Partnerships
    • Partner With Lastline
    • Partner Portal
  • Labs
    • Labs Blog
    • Labs Research Papers
  • Company
    • Threat Intelligence
    • Mission & Principles
    • Management Team
    • Board & Investors
    • News & Events
      • Media Coverage
      • Press Releases
      • Events
    • Lastline Blog
    • Awards
    • Careers
    • Contact
APT28 Hijacked LoJack Domains

APT28 Rollercoaster: The Lowdown on Hijacked LoJack

Posted by David Wells, Stefano Ortolani, Andy Norton and Luukas Larinkoski ON May 31, 2018

Recently, the ASERT team at Arbor Networks, published a report on an old version of the Absolute Software product, Absolute LoJack for laptops, being illicitly modified by suspected APT28 actors. The LoJack implant, previously known as Computrace and brought into the spotlight in 2014 at...

Read More
Scriptlets Attack Abstract

When Scriptlets Attack: Excel’s Alternative to DDE Code Execution

Posted by David Wells ON Dec 7, 2017

We've recently discovered a malicious Office Excel file that appeared to have the ability to download and execute malware. Examining the file, we saw no evidence of macros, shellcode, or DDE functionality. When scanning the file on Virustotal, the low detection gives the appearance that...

Read More
LATEST PRESS RELEASES
  • December 13, 2019
    Lastline Unveils Defender 9.0 to Enhance Public Cloud Workload Security
MEDIA MENTIONS
  • December 13, 2019
    Containers and Security: Complexity Makes it Easy to Overlook Problems
FROM THE BLOG
  • December 12, 2019
    Stop Ransomware with Network Detection and Response
© 2019 Lastline Inc. All Rights Reserved
Support | Customer Login | Privacy Policy | Policies | 877-671-3239
© 2019 Lastline Inc. All Rights Reserved
Support | Customer Login | Privacy Policy | Policies | 877-671-3239
This website uses cookies for website analytics purposes. For more information on how this website uses cookies, please visit our Privacy Policy. I ACCEPT
Privacy & Cookies Policy

Necessary
Always Enabled

This is an necessary category.

Non Necessary

This is an non-necessary category.

Save & Accept