[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Would you lock your house and leave the keys hanging in the keyhole?  Would you just leave the keys lying around where it could easily be stolen?  No, you wouldn’t.  Yet, there are those who would leave their passwords exposed for anyone to see, share their passwords, or even worse, have weak passwords and use […]

RSA Conference 2015
April 22, 2015

The RSA Conference 2015 is being held at the Moscone Center in San Francisco. It a massive event, with thousands of people in attendance. A huge number of booths built up by vendors provide coffee bars, presentations, and swag giveaways. Threat intelligence is hawked by many here. But, some of the most surprising parts of […]

One of the most important features of a malicious attack is its ability to conceal itself from both protection solutions and victims. The main role in performing a hidden attack is played by exploits to software vulnerabilities that can be used to secretly download malicious code on the victim machine. Generally, exploits are distributed in […]

BREAKING NEWS! You feel safe, knowing that you anti-malware is standing guard and will stop any suspicious intrusion. Well, malware authors have gone one up on security file scanners by utilizing new methods of avoiding detection. These cyber crooks are doing this by using fileless malware.  Fileless malware will hide itself in locations that are […]

The CozyDuke APT
April 22, 2015

CozyDuke (aka CozyBear, CozyCar or “Office Monkeys”) is a precise attacker. Kaspersky Lab has observed signs of attacks against government organizations and commercial entities in the US, Germany, South Korea and Uzbekistan. In 2014, targets included the White House and the US Department of State, as believed. The operation presents several interesting aspects extremely sensitive high […]

Be on your toes folks, because malicious attackers have another trick up their sleeves.  They are now resorting to another email trick – they impersonate domain administrators by sending out emails with the subject matter, ‘Internal Only’ and from the ‘Administrator’.  Their aim is to get you, the recipient, to download malware. In the email, […]

Patch Update
April 15, 2015

BREAKING NEWS! Okay, it’s time to secure the perimeters again. Flaws have been found and the updates are ready to be installed. If you are running software from Microsoft, Adobe or Oracle, the updates are available. Adobe released a fix for 22 flaws, while Microsoft has 11 updates bundles to fix more than two dozen […]

Introduction One of the most active APT groups in Asia, and especially around the South China Sea area is “Naikon”. Naikon plays a key part in our story, but the focus of this report is on another threat actor entirely; one who came to our attention when they hit back at a Naikon attack. Naikon […]

Microsoft releases 11 Security Bulletins (MS15-032 through MS15-042) today, addressing a list of over 25 CVE-identified vulnerabilities for April of 2015. Critical vulnerabilities are fixed in Internet Explorer, Microsoft Office, and the network and graphics stacks. Most of the critical remote code execution (RCE) vulnerabilities reside in the IE memory corruption bugs for all versions of Internet […]