Shane Chambers No Comments

DHL Phishing Campaign Found to Contain New Strain of Malware

Every year, the number of phishing scams seems to be increasing, with the malware-ridden emails getting continually more sophisticated and convincing. The latest global phishing campaign purporting to be from international courier giants DHL has been tricking users into opening a fake PDF attachment – and subsequently unleashed a previously unseen piece of malware to wreak havoc on their PCs.

Cyber criminals are taking advantage of DHL’s worldwide reputation and brand recognition in order to distribute a previously unseen strain of malware, named Muncy. Once the user downloads the fake PDF attachment, the trojan sneaks onto their PC and begins scanning the C:/ drive for any files containing sensitive data.

Once it has completed its scan, it then sends back any data found to the criminals’ server, where they can attempt to steal the user’s money, impersonate them to commit identity fraud, or even request a ransom from them to not release the data publicly.

So how do I recognise this email if I get it? Well, the first question you should ask yourself if you receive a mail from DHL is if you’re expecting a parcel from them. Getting a parcel delivery notice when you’re not expecting any deliveries is always a sign that the email may not be genuine.

For this scam in particular, they have taken advantage of some of DHL’s mail servers to make the emails appear as if they are coming from [email protected](.)com, so they can look quite genuine. The subject of the email is reported to be ‘DHL SHIPMENT NOTIFICATION’, although this may be subject to change if people start to catch on.

The most important thing to bear in mind is to never open links or download attachments in emails that you suspect are not genuine. Most companies like DHL will instead email you a tracking number that you can independently put into their website to see where your delivery is, not send you a PDF out of the blue. Almost any attachment can be dangerous (.txt files are usually safe, but even these have been exploited to contain malware now). That means not just .exe files can execute themselves on your PC and install malware.

If in doubt, throw it out. Be sure to always think before you click anything in an email. If someone, even a trusted friend or colleague, sends you an email asking you to do something you wouldn’t normally, confirm with them over the phone (not text) or in person before you take any actions.

Phishing scams are getting increasingly sophisticated and common, fooling the filters of consumer-based email providers such as Gmail and Hotmail, and even slinking past corporate providers such as Office365 and some advanced email filtering solutions.

For businesses, we would strongly advise cyber security awareness training be provided to all staff as a key tenet of your security practices – doing so can be the difference between avoiding a cyber attack and being the subject of a costly data breach and GDPR fine.

Shane Chambers No Comments

How the Latest Zero-Day Flash Bug Bypasses Your Antivirus and Firewall

Adobe has been forced to release an out-of-schedule emergency security patch to its users, after a zero-day vulnerability was discovered to affect Adobe Flash Player. Users are being urged by Adobe to update to version 30.0.0.113 of Flash Player, which contains mitigations for the zero-day as well as addressing three other flaws. This latest flaw was discovered already being used in the wild to attack Windows users, and doesn’t exploit browsers like typical Flash exploits – instead, it works through Microsoft Office documents which it utilises to download and execute malicious code.


Most Flash exploits take advantage of web browsers, however this zero-day utilises Office documents and is usually received through phishing emails

Read more

Shane Chambers No Comments

Antivirus Experts Discover Malware Samples Designed to Exploit Meltdown and Spectre

It looks like the Meltdown and Spectre fiasco is only just getting warmed up. Security researchers at antivirus testing firm AV-TEST have discovered more than 130 samples of malware that attempts to leverage the Meltdown and Spectre vulnerabilities. The malware samples analysed by AV-TEST appear to be mostly Poof-of-Concept code, and still in the research phase, however, it is believed that cyber criminals will be similarly experimenting with malware that utilises these vulnerabilities.


Meltdown and Spectre will haunt IT systems for years to come, potentially, as between them they can affect most processors in use since 1995

Read more

Shane Chambers 1 Comment

Cybercrime as a Service – Online scamming courses, €10 hacking software, & much more

Everyone’s talking about cyber security these days, and there’s a seemingly endless list of protective measures to be taken to prevent cyber attacks. It can be a bit daunting, and at times hard to secure the right budget, so is all this hype about security really necessary? The short answer is – YES. The long answer is that in order to understand why cyber security has taken over the forefront of IT for businesses, you must first understand that cyber criminals are no longer just bedroom hackers; they’re a fully fledged industry.


Cybercrime costs the economy an estimated $450 billion globally

Cybercrime-as-a-Service is on the rise in a big way, with criminals constantly developing more advanced ways to steal businesses’ hard-earned cash over the internet. The industry continues to evolve and adapt and is now highly organised. All one has to do is log onto certain sites on the Dark Web and they’ll be greeted with professional hackers offering ransomware, malware, phishing, DDoS and much more as-a-service.

Read more