Iran and the USA: an escalation in cyber-warfare?

Last week, Iran’s Minister of Communications and Information Technology announced that the country had successfully prevented an attempted “huge cyber attack organised by a foreign state”. While he did not provide specific details about the incident, he said that Iran had faced “a highly-organized and state-sponsored attack against the infrastructures of the electronic government and …

Iran and the USA: an escalation in cyber-warfare? Read More »

Packing heat: the rise of credential stuffing in 2019

Credential stuffing, a simple attack that involves running lists of stolen credentials against various services in the hopes of finding password reuse, is one of the most popular ways cyber criminals acquire accounts to sell on Darknet marketplaces. Victims often don’t know the difference between credential stuffing or an actual exploit or breach, and this …

Packing heat: the rise of credential stuffing in 2019 Read More »

Attack of the Zombie Eels

Recently our team discovered two very interesting tools published on GitHub by security researchers Michele Orrù and Giuseppe Trotta. Muraena is an almost transparent reverse proxy capable of proxying the victim through to the legitimate target website while harvesting credentials and cookies, and in most cases allowing 2FA flows to complete. (source)   Necrobrowser is …

Attack of the Zombie Eels Read More »

Hackers hacking hackers

Earlier this week, the UK’s National Cyber Security Centre (NCSC) and the USA’s National Security Agency (NSA) revealed that the Russian hacker group widely known as Turla had been using the Iranian APT Oilrig’s tools and infrastructure to target victims for its own ends. The researchers came to this conclusion when investigating an attack that …

Hackers hacking hackers Read More »

Scroll to Top