By Anthony Jirouschek, Security Architect On July 2nd, we published an article about an attack we observed using EtherHiding and Fake-Updates to deliver the Lumma infostealer. After the article was published, we did some threat hunting and found a different version of this attack that uses encoding to obfuscate, or hide, the attack better. As […]
Read MoreBy Anthony Jirouschek, Security Architect We recently observed an attack using EtherHiding to deliver Fake-Updates malware, which eventually resulted in an infostealer named Lumma being installed. EtherHiding is essentially using smart contracts on a crypto platform to obscure and deliver malicious code. In this case, the threat actor used Binance’s Smart Chain contracts. EtherHiding is […]
Read MoreUnsafe websites can cause chaos. But they’re everywhere, and at some point, you’re going to run into one. How can you spot a malicious site? Let’s take a look at a real-world example. QUESTIONS? WYRE ALWAYS HELPS.
Read MoreTechnology is everywhere. And its use in our day-to-day lives presents both incredible opportunities and significant risks for businesses of all sizes. While enabling us to streamline operations, reach wider audiences, and innovate like never before, technology also exposes us to cyberthreats that can disrupt operations, steal sensitive information, and damage reputations. Cybercrime effects everyone. […]
Read MoreCyberattacks can happen to anyone. But the more you know, the easier cyberattacks are to spot. Let’s take a quick look at three common types-and some easy ways to protect yourself. QUESTIONS? WYRE ALWAYS HELPS.
Read More” One of our [business] managers used public Wi-Fi without a secure connection, and his system was infiltrated. Once the hacker was in that system, he was able to monitor and ultimately take over the email inboxes and outboxes. With that access, the scammer created a scheme to steal money from us.” -Wire Fraud Survivor […]
Read More“How did the wire fraud scam find its way to you?” Anonymous: We were the victim of hacked public Wi-Fi. One of our managers used public WI-Fi without a secure connection, and his system was infiltrated. Once the hacker was in the system, he was able to monitor and ultimately take over the email inboxes […]
Read MoreSmishing is a cyberattack that uses text messages to trick you into giving away personal info. What does a smishing text look like in the real world? Here’s an example that recently came to our attention. Never, ever click on a link inside a text. Instead, use Google to search for the site. Have questions? […]
Read MoreInvented in the 1980s, firewalls have been protecting networks for decades. At its simplest, a firewall is a security feature, keeping a close eye on a network’s incoming and outgoing activity. It decides if that activity should be allowed or blocked, building a detailed log of all the decisions it makes. The end goal of […]
Read MoreFor any business, waking up to a wire fraud incident can be devastating. Money is missing, the network is compromised, and trust is broken. The best protection is prevention. CEO Tyler York discusses how WYRE can help you secure your business. When you’re ready, WYRE is here. LEARN MORE ABOUT WIRE FRAUD
Read More