Cite: https://www.proofpoint.com/us/threat-insight/post/massive-adgholas-malvertising-campaigns-use-steganography-and-file-whitelisting-to-hide-in-plain-sight The checks that were made to identify infection candidates are especially interesting, going so far as to check for OEM branding.
Cite: https://twitter.com/Kleissner/status/750019370617823232 “How to defeat that ransomware easily: Download Fiddler, set a breakpoint, manipulate BTC balance”
NetGear Web GUI Password Recovery and Exposure Security Vulnerability: http://kb.netgear.com/app/answers/detail/a_id/30632 “NETGEAR is aware of the security issue that can expose web GUI login passwords while the password recovery feature is disabled. This vulnerability occurs when an attacker can access the internal network or when remote management is enabled on the router.” Norton vulnerability: unclicked links […]