Author:Stacy Taylor

Overview: What is an advanced persistent threat (APT)?

“It’s important for businesses to understand that APTs use a wide range of malware, from custom-built toolkits to commodity malware. When people use the term ‘APT malware,’ they’re often referring to the custom, advanced malware — Stuxnet is a good example,” says Karim Hijazi, CEO of Prevailion,...

Share Post

Goblin Panda – One of the World’s Most Active APTs

When considering global threat actors and the impact these groups can have on different geographical regions and industries, we’d be remiss to not spend some time talking about Goblin Panda, considered by Prevailion to be one of the most active Advanced Persistent Threat (APT) groups in the world today. According to the Council on Foreign Relations, “This threat actor targets government agencies and entities in the defense and energy sectors in Southeast Asia with an interest in issues related to tensions in the South China Sea.” Goblin Panda’s Activity According to Prevailian’s threat...

Share Post

Ransomware as a Data Breach Decoy

Gone are the days of small-time cybercriminals using ransomware to earn a quick buck. Ransomware--and the criminals who use it--have certainly evolved. Though it initially made a name for itself as a tactic of the lesser-skilled criminal, malicious actors are now exploiting the established expectations of its impact and limitations in order to hide inside a network.  For those organizations with robust security strategies, ransomware had become little more than an annoyance. They were able to recover rather quickly using backups. More often, though, that’s not the case. In the past...

Share Post

Masquerading as Card-Skimmers: Are Attackers Doing More with Magecart?

While Magecart is well known as a malware hacking groups use to inject card-skimming scripts into e-commerce platforms, Prevailion researchers have detected many compromises with Magecart that suggest the malicious actors are not actually going after credit card data.  According to public data breach records, the credit card information of organizations from British Airways to NutriBullet, Tupperware, easyJet and Macy’s has been targeted in different card-skimming campaigns.  In July 2019, attackers leveraged a vulnerability in the e-commerce software platform Magento, which left more than 960 online retailers compromised in a single...

Share Post

Lower the Price Tag of a Data Breach with Threat Intelligence

Detecting and containing a data breach takes the better part of a year, approximately 280 days, for the average organization, according to IBM’s 15th annual Cost of a Data Breach Report, Unfortunately, the longer it takes to identify a breach, the bigger the price tag of the overall breach lifecycle.  This year’s report found that more than half (52%) of breaches are the work of malicious actors. Of those, 13% of breaches are reportedly caused by nation state attackers.The findings also revealed that more attackers are using compromised credentials and leveraging...

Share Post