CTM360 Blog
Latest News, Articles and Advisories from CTM360.
Solar Wind Attack: Update
SolarWinds - an American software vendor for managing networks and infrastructure has been breached. Orion, a network monitoring product was modified by a state-sponsored threat actor via embedding ba...
Read MoreSensitive Information Disclosure On Professional Networking And Employment Platforms
CTM360 has observed a trend in which employees from financial institutions are exposing critical company information or infrastructure-related details on professional networking and employment platfor...
Read MoreWordPress Pharma Hack
Pharma Hack is an exploit targeting WordPress sites using SEO spamming. Hackers inject the site with content related to pharmaceuticals in order to lure users who are looking for drug resellers either...
Read MoreFrom Unemployed To A Money Mule During The COVID-19 Crisis
Cybercriminals are taking advantage of the COVID-19 pandemic, to lure laid-off individuals seeking jobs or working remotely. These cyber crooks have been targeting this specific class of people to wor...
Read MoreNew Retefe Malware Campaign
A new Retefe Malware campaign targeting Middle East banking institutions that targets both Windows and Mac users was recently discovered. The malware campaign added new URL patterns to the Retefe prox...
Read MoreC-Level Web-Conferencing Best Practices
As the whole world goes into a deep and speedy phase of digital transformation, cloud, and online service, there has been an excessive reliance on web conferencing services for remote work meetings. A...
Read MoreBaiting News Site
Over the last few years, CTM360 has observed a rapid rise of fraudulent and bogus websites disguised as genuine news sites. In this particular type of fraud, users are misled via fake/bogus news with ...
Read MoreImportance Of Verification On Social Media Platforms
Why should you get your account verified?
Team CTM360 takes action on hundreds of fake profiles daily and part of the requirements to take down such profiles is to provide the host with the genuine p...
Read MoreZoom: Security Issues And Recommendations
As the current pandemic crisis hits an all-time high, more countries are going into partial or complete lockdown. This has resulted in many employees being forced to work from home and rely heavily on...
Read MoreRemote Work Guidelines
As the current pandemic crisis has scaled across the globe, the majority of the organizations have resorted to working remotely. This opens up an organization to potential cyber threats as there is a ...
Read MoreCoronavirus Related Scams
As the current pandemic crisis has scaled across the globe, there has already been a surprisingly large number of cyber crime related incidents. Cybercriminals are using the novel COVID-19 issue as a ...
Read MoreWatering Hole Attack
A watering hole attack is a type of cyber attack that spreads malware into a victim’s devices. The malware being used in these attacks either gathers the victim’s personal data and sends it back to th...
Read MoreImportance Of Patching
Security vulnerabilities are known to appear in operating systems and applications over the course of time. It is the role of the vendors to preserve the integrity of these products by providing patch...
Read MoreTA505 Targeting Retail Industries And Financial Sectors
TA505, is a financially motivated Russian threat group targeting retail industries and financial sectors around the world since 2014. They continuously update their tactics, techniques, and procedures...
Read MoreBrute-Forced BIN Attacks: High-Volume Of Small Transactions
Recently, there have been reports from across the globe of banks being impacted by the ‘BIN Attack’. Where the attackers bruteforce a large number of randomly generated card numbers. There have been c...
Read MoreUnlocking New Doorways To Multi-Channel Scams
CTM360 has discovered a new wave of financial attacks where cybercriminals use fake ad campaigns/pages to redirect users to fraudulent websites that have investment schemes, Bitcoin Ponzi schemes, fak...
Read MoreMisconfiguration Of Amazon S3 Buckets
Amazon S3 is one of the leading cloud storage solutions offered by Amazon and is used by companies globally to power various tasks and operations. There are thousands of data breach incidents caused b...
Read MoreDNS Hijacking abuses trust in core internet service
A new cyber threat campaign called “Sea Turtle” has been discovered. The ongoing operation began in January 2017 and continued through the first quarter of 2019.
The campaign is targeting public and ...
Read MoreGuide To Unofficial Business Pages On Facebook
WHAT ARE UNOFFICIAL FACEBOOK BUSINESS PAGES?
All unclaimed pages that act as placeholders for locations without a managed business page are considered to be “Unofficial”.
Users will still be able to...
Read MoreCarding Websites Demystified
Carding is the process of obtaining unauthorized access to a card's information and fraudulently using it for personal gain.
How does it work?
Criminals aim to carry out carding transactions in two...
Read MoreMalicious Punycode Look-Alike Domain
Threat Description
Punycode is a special encoding scheme for internationalized domain names, which makes it possible to register domains with foreign characters. It works by converting strings of Un...
Read MoreGift Card Scams
Threat Description
Nowadays, gift cards are a token of appreciation to a family, friend or co-worker. However, they prove to be troublesome when used to scam people; many people within the region do...
Read MoreDomain & URL Mutation
Fraudsters are continuously coming up with new ways to lure targets for monetary gains or to collect personal information (like Full name, email, telephone or bank account details etc.). Team CTM360 h...
Read MoreMisleading “COM-“ Domain Registration
Threat Description
URL obfuscation has long been a tactic of cybercriminals in their attempt to trick their potential victims. Yet again, another obfuscation technique has been observed by Team CTM3...
Read MoreTRAP10 - Binary Options Trading
Threat Description
Binary Trading (commonly also known as Binary Options Trading or Binary Options) is a type of option where the trader takes a yes or no position on the price of a stock or other a...
Read MoreWannaCry RansomWorm: The Next Expected Waves
Threat Description
Subsequent to our advisory on the cache of tools leaked from the NSA by the group ShadowBrokers, a cybercriminal group has incorporated one of the exploits, EternalBlue, into a wo...
Read MoreShadow Brokers Alleged Compromise Of Regional Swift Network
A prominent hacking group has allegedly leaked documents and tools from 2013 belonging to the NSA. This cache of data contains a targeted list of at least 29 financial institutions from the Arab World...
Read MoreBeware Of Password Spraying
Password Spraying is a technique used by attackers in an attempt to gain access to the victim's account by trying passwords that users are most likely to use. Attackers in a single attempt can try to ...
Read MoreTwo Factor Authentication - A Comprehensive Guide
Most services nowadays require signup and login procedures that are based on usernames and passwords.
Unfortunately, single-factor authentication is not enough to protect accounts especially at...
Read More