Emotet Malware Campaigns

2019-08-02T18:34:58+00:00Categories: Security Talk, Threat Intel|

    What measures have you taken to protect your organization against Emotet malware campaigns? We wish we could assure you otherwise, but your antivirus software, antispyware, and firewalls simply aren’t enough to safeguard you.   Here’s why.     What Is Emotet?   Emotet is a trojan that was first designed to steal banking credentials, but it has [...]

Emotet Changing Evasion Tactics To Avoid Detection

2019-02-16T05:18:07+00:00Categories: News and Updates, Security Talk, Threat Intel|

ElevatedPrompt has been tracking the new variant of Emotet Trojan. Mid - January 2019, our security team has seen a drastic uptick in the Emotet related campaigns and have been tracking the different variants and delivery mechanisms. The one variant that got me interested in writing this blog was the latest campaign observed on 14th February, 2019. This Emotet variant [...]

When is an image not an image? When it’s a shell!

2019-02-13T21:42:06+00:00Categories: Threat Intel|

Securing online systems is tough work. A web design shop is learning this lesson the hard way. I was recently reviewing some traffic from one of our DET3CT appliances and came across a domain that I wanted to know more about. VirusTotal is a great resource for this so I started there. After plugging in the domain this is what [...]

Cryptominer Hunting

2018-10-01T20:44:14+00:00Categories: Threat Intel|

Cryptomining malware is a form of malware that uses energy and resources of compromised devices to mine cyrptocurrency.  Unsuspecting computer users and enterprise level server administrators are mining cryptocurrency for others right now and they don’t even know they’re doing so. If it were me I’d want my cut! Let’s learn more about this type of malware and how [...]

Three new exploits added to recently discovered Mirai variant

2018-09-10T22:35:18+00:00Categories: Threat Intel|

A new variant of the Mirai botnet malware has been found in the wild. Security researchers and the tech savvy may remember the original Mirai botnet which was discovered in August of 2016. It was responsible for turning Linux based machines (mostly IP cameras and routers) into a large network of remotely controlled devices which were attributed to notable [...]

Malicious Ads remain a large threat to Organizations

2018-05-15T18:43:23+00:00Categories: Threat Intel|

So far, 2018 is shaping up to be a year in which malicious advertising is growing and spreading throughout the web. Threats are becoming more and more sophisticated, with home and corporate web surfers being tricked into clicking on innocent looking ads and unknowingly installing malware on their computers, or triggering other kinds of attacks. Many people and companies haven’t [...]

Serious weakness discovered in WPA2 protocol used to secure all Wi-Fi networks

2017-10-16T20:50:00+00:00Categories: News and Updates, Threat Intel|

This blog post was written for rapid release. Please check back for further details and updates as it becomes available. A serious weakness in WPA2 was discovered and published this morning here, which allows an attacker within wireless range to exploit this weakness using a Key Reinstallation Attack (KRACKS). This discovery can be leveraged by potential attackers to capture encrypted [...]

DDoS Pearl Bot Unravelling with EPSTACK

2017-03-16T22:55:09+00:00Categories: Threat Intel|Tags: , , , |

Threat hunting provides us with threat intelligence data on potential attacks and allows us to stay ahead of the cat and mouse game of cybersecurity. By understanding emerging threats, we are better able to protect our critical assets. elevatedprompt utilizes a multi-layer approach to proactive cyber defence, and by leveraging of our log management and threat intelligence platform – EPSTACK, we are [...]

Come by our booth March 18 & 19, 2019 at BSides Vancouver, a two-day, high-caliber gathering for information security professionals, hackers, coders and the greater tech community. link to https://bsidesvancouver.com/