[email protected] +603-2181 3666
Extol Threat Intelligent Notification
The CozyDuke APT
April 22, 2015

CozyDuke (aka CozyBear, CozyCar or “Office Monkeys”) is a precise attacker. Kaspersky Lab has observed signs of attacks against government organizations and commercial entities in the US, Germany, South Korea and Uzbekistan. In 2014, targets included the White House and the US Department of State, as believed. The operation presents several interesting aspects extremely sensitive high […]

Be on your toes folks, because malicious attackers have another trick up their sleeves.  They are now resorting to another email trick – they impersonate domain administrators by sending out emails with the subject matter, ‘Internal Only’ and from the ‘Administrator’.  Their aim is to get you, the recipient, to download malware. In the email, […]

Patch Update
April 15, 2015

BREAKING NEWS! Okay, it’s time to secure the perimeters again. Flaws have been found and the updates are ready to be installed. If you are running software from Microsoft, Adobe or Oracle, the updates are available. Adobe released a fix for 22 flaws, while Microsoft has 11 updates bundles to fix more than two dozen […]

Introduction One of the most active APT groups in Asia, and especially around the South China Sea area is “Naikon”. Naikon plays a key part in our story, but the focus of this report is on another threat actor entirely; one who came to our attention when they hit back at a Naikon attack. Naikon […]

Microsoft releases 11 Security Bulletins (MS15-032 through MS15-042) today, addressing a list of over 25 CVE-identified vulnerabilities for April of 2015. Critical vulnerabilities are fixed in Internet Explorer, Microsoft Office, and the network and graphics stacks. Most of the critical remote code execution (RCE) vulnerabilities reside in the IE memory corruption bugs for all versions of Internet […]

IT News

How great would it be if we could walk into a store and buy cyber security off the shelf?  Such convenience is a dream, but we can all dream, can’t we? However, cyber security cannot be bought as described above, but must be taught.  This brings us to the inherent threat in organizations – the […]

Dyre Wolf Banking Malware
April 7, 2015

As we can see, cybercriminals are relentless in their pursuit of quick money, and at the same time creating fear in us. Dyre Wolf, named by IBM Security researchers, is a variant of Dyre Trojan which first made its appearance in June 2014.  It has been used in a succession of phishing campaigns across the […]

DDoS attacks are the rise. In 2014, attacks almost doubled compared to that of the year before, and it does not seem to abate.Dos or DDoS attacks are more than just causing servers to be unavailable to users. Many attackers are using DDoS attacks to steal information and money as well. First, let’s look at the […]

IT News

A new Trojan specifically targeting the energy sector has been found.  Trojan.Laziok is being used to compromise energy sector companies in a multi-staged targeted attack.  This Trojan also acts as a reconnaissance tool, which means that it will gather information on the systems and then tailor the attack methods. The malware will then identify the […]