Identity theft continues to be a challenging and expensive risk for consumers, and malware that’s specifically designed to steal users’ account data and identities are often used to commit the crime. The reason for this persistent threat? Simple, identity theft is a very lucrative business for cybercriminals. The...

Cybercriminals are motivated by several things, including fun, fame, ideology, revenge, and especially monetary gain. They use many techniques in their quest to achieve these goals, and keylogging malware (aka keyloggers), and other password snatching techniques are among their primary tools. Understanding the Why of Malware...

We were sitting around the campfire this week reading the latest Lastline Labs blogs post. We were ignited by some scorching questions regarding this shadowy malspam campaign. The burning issue on our minds was: Why would Smoke Loader go to the trouble of gaining a foothold...

By Oleg Boyarchuk and Stefano Ortolani Introduction When ransomware behavior is clearly exhibited, it is relatively easy for a sandbox or a personal A/V to assert detection; after all, in its simplest form, ransomware malware must at least: (1) search for files to be encrypted, and (2)...

One could argue that cybercriminals had a real break-out year in 2017. Huge data breaches, new malware techniques, and some headline-grabbing attacks. Our top 10 blog posts demonstrate the interest in what the bad guys are up to, and how to defend against it. From...