One of the big news stories last week was the Wall Street Journal article, reporting that Google has “given up on their internal network” and are moving their business applications to the internet (called BeyondCorp). The reason behind is that they don’t see the internal network as private/protectable anymore. With todays adversaries, malware and general lack […]
Continue Reading“You order form:[RANDOM] from 06/05/15 recived;” Attachment Analysis
Today I came across a message, which was rather interesting. The mails were received with different subjects, random company names in them as well as random attachment names. The attachment is a Word document with the “*.doc” extension (never a good sign). Quickly analysing shows that the Word document contains a Marco script, which, when executed, […]
Continue ReadingPhishing Gang Forgets Source Code
I love to analyse and take apart phishing pages. Such phishing pages are nothing new, you can find them almost daily. I always enjoy poking around and investigating if I find something new, something of interest or just some sort of timestamp to be able to pinpoint the speed a gang has in setting up new phishing pages. […]
Continue Reading