1. Tuesday, July 12, 2016
    With season two of Mr. Robot approaching, the storyline follows a hacker group that takes down an evil global corporation and collapses the financial market. Led by the mysterious Mr. Robot, the hackers use a variety of tricks to evade detection, and seem to cover their tracks at every turn. There a... READ MORE
  2. Tuesday, June 28, 2016
    We've recently observed a new crypter called Xenon used to deliver Locky , a strain of ransomware, and Ruckguv , a type of malware that can download and install other types of malware. Xenon employs a novel trick to bypass debuggers, which we’ll describe here along with the techniques it uses. We al... READ MORE
  3. Saturday, June 25, 2016
    Well Britain, you’ve done it. The referendum is over and it's time to start thinking ahead about how the UK will reconcile its new laws and regulations. I believe that the UK could be at the beginning of a cybersecurity Renaissance, and I’ll explain why. At this point, it is uncertain how long it wi... READ MORE
  4. Monday, June 20, 2016
    The Security Consulting team here at Fidelis specializes in investigations of critical security incidents by advanced threat actors. Last week, after Guccifer 2.0 claimed responsibility for the intrusion into the Democratic National Committee’s (DNC) servers, we were provided with the malware sample... READ MORE
  5. Tuesday, June 14, 2016
    What can bad guys use to launch a ransomware attack, facilitate an email spamming platform, or ensure persistent access to an enterprise? Compiled malware and compromised credentials could work. But web shells provide an even more stealthy way to e stablish a beachhead and quietly hide on the networ... READ MORE
  6. Thursday, June 9, 2016
    One of the biggest challenges when you go shopping for new security tools is answering the inevitable question from finance: “What’s the value?” Determining the ROI of a new security product isn’t always an exact science. There are no hard and fast rules to follow – which is why generic ROI calculat... READ MORE
  7. Tuesday, June 7, 2016
    Fidelis Cybersecurity has been investigating a new variant of Ursnif, a family of trojans that captures and reports information about user activity back to the attacker. We recently observed the variant distributed in phishing runs designed to appear as legitimate banking-related emails. On infected... READ MORE
  8. Wednesday, June 1, 2016
    At InfoSecurity Europe in June, I will be showing a demonstration of what we call: “ Attacker vs. Victim ”, which uses real zero days, malware and tools to compromise a fictitious company and steal data. The purpose of this demo is to show executives, media and security practitioners what an actual... READ MORE
  9. Thursday, May 26, 2016
    On May 12, 2016, Fidelis Cybersecurity witnessed an update to Vawtrak malware , a banking trojan, spread via an email campaign using subpoena- and lawsuit-related themes. The configurations observed in this campaign point to an attempt to harvest user credentials when visiting accounts on major fina... READ MORE