Avanan Blog Attack Briefs (4)


Analyzing the Malware Wiper

A new form of malware is reportedly being deployed by Russia against Ukraine.

Read more

Using CAPTCHA Forms to Bypass Filters

In April 2021, Avanan researchers wrote about how hackers are using CAPTCHA forms–those annoying puzzles you have to fill out after entering data to prove you are hu...

Read more

Highlighting Text in White to Fool Anti-Phishing Filters

Hackers are constantly looking for ways to disguise their intentions. They not only have to craft phishing emails that not only bypass filters but are also believabl...

Read more

Avanan Alert: Cyber Attacks Originating From Russia Increase 8x in Last 24 Hours

Starting on February 27th, Avanan has noticed an 8x increase in email-borne attacks originating from Russia.

Read more

Hackers Attach Malicious .exe Files to Teams Conversations

Microsoft Teams continues to grow in popularity. Teams counts 270 million monthly active Teams users; that's up a tidy 20 million from July 2021.

Read more

How Hackers Follow Up Successful Campaigns

When hackers find something that works, they keep going at it until it doesn't.

Read more

Hackers Find Success Spoofing Walgreens, Keep At It

Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.

Read more

Using .ppam Files to Wrap Executable Content

PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.  

Read more

Walgreens Spoof Leads to Credential Harvesting

Spoofing brands is an effective way for phishers to get into the inbox and to convince end-users to click.

Read more

BECs Are Tough to Stop. Unless You Have Avanan

Have you ever gotten an email like this from your boss?

Read more

DHL Notice Delivers Malware

Every quarter, Check Point tracks the brands that were most frequently imitated by hackers.

Read more

How to Stop a BEC Attack

Business Email Compromise attacks are some of the most pernicious out there. They are an ideal combination of seemingly innocent yet incredibly difficult to stop. Th...

Read more

Hello, This is Credential Harvesting Calling

It is very simple to get voicemail notifications as an email. Any VoIP phone system can do it. It’s popular because it’s convenient and efficient. Plus, it’s been in...

Read more

Missed Delivery Messages as a Pretext for Phishing

The feeling is familiar: waiting for an important email, only to find that the message has been held up, either by a security solution or another reason.  

Read more

Insecure Transfer: Hosting Phishing Links on WeTransfer

Check Point researchers have discovered a burgeoning attack taking advantage of public file sharing sites like WeTransfer to host phishing content. 

Read more

Sharing Malicious Files Within Adobe Cloud

Adobe Creative Cloud is a popular suite of apps for file-sharing, creating, and more. Popular apps include Photoshop and Acrobat.

Read more

Update: SLINKIFY Attack Still in Effect

In December, Avanan researchers discovered a new phishing attack that involves sending a plain text email with malformed URLs to bypass the URL protection and rewrit...

Read more

Google Docs Comment Exploit Allows for Distribution of Phishing and Malware

Google Docs, as well as the larger Google Workspace, is ideal for productivity and collaboration. Employees across the globe can work, in real-time, together.

Read more

Construction Industry Hit with Crypto-Based Extortion Attack

A new report has found that the construction industry is most at risk for ransomware attacks.

Read more

Hackers Begin to Take Advantage of Omicron Variant

The Omicron variant of COVID-19 is spreading rapidly around the world. While we wait for more information on how it will change the pandemic, hackers have decided to...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial