Info collector


Malware spam: “New documents available for download” / /

By on May 10, 2018 in Latest SPAM

This fake Barclays spam seems to lead to the Trickbot banking trojan. From:    Barclays []Date:    10 May 2018, 13:16Subject:    New documents available for downloadSigned by:    Standard encryption (TLS) Learn moreBarclays Bank PLC Has Sent You Important Account Documents to SignYou can view the document in your Barclays

Continue Reading »

“Best porno ever” Necurs spam

By on May 4, 2018 in Latest SPAM

This spam (apparently from the Necurs botnet) promises much, but seems not to deliver. From:    Susanne@victimdomain.tld [Susanne@victimdomain.tld]Date:    4 May 2018, 10:22Subject:    Best porno everHi [redacted],Best gay,teen,animal porno everPlease click the following link to activate your account.hxxp:||,Susanne The sender’s name varies, but is always in the same

Continue Reading »

MS-ISAC Releases Advisory on PHP Vulnerabilities

By on April 27, 2018 in Recent Vulnerabilities

Original release date: April 27, 2018 The Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an advisory on multiple Hypertext Preprocessor (PHP) vulnerabilities. An attacker could exploit one of these vulnerabilities to take control of an affected system. NCCIC encourages users and administrators to review MS-ISAC Advisory  2018-046 and the PHP Downloads page and […]

Continue Reading »

Drupal Releases Critical Security Updates

By on April 26, 2018 in Recent Vulnerabilities

Original release date: April 25, 2018 Drupal has released critical updates addressing a vulnerability in Drupal 8.x and 7.x. A remote attacker could exploit this vulnerability to take control of an affected system. NCCIC encourages users and administrators to review Drupal’s Security Advisory and apply the necessary updates. This product is provided subject to this Notification […]

Continue Reading »

New Traffic Light Protocol (TLP) levels for 2018

By on April 1, 2018 in Latest SPAM

The Traffic Light Protocol should be familiar to anyone working with sensitive data, with levels RED, AMBER, GREEN and WHITE being used to specify how far information can be shared. In recent years it has become clear that these four levels are not enough, so the United Nations International Committee on Responsible Naming (UN/ICoRN) has […]

Continue Reading »

“Faster payment” scam is not quite what it seems

By on March 8, 2018 in Latest SPAM

I see a lot of “fake boss” fraud emails in my day job, but it’s rare that I see them sent to my personal email address. These four emails all look like fake boss fraud emails, but there’s something more going on here. From:    Ravi [Redacted] Reply-To:    Ravi [Redacted] To:    accounts@victimdomain.comDate:    23 February 2018 at […]

Continue Reading »

Swisscoin [SIC] cryptocurrency spam

By on January 15, 2018 in Latest SPAM

Swisscoin is a fairly low-volume self-styled cryptocurrency that has been the target of a Necurs-based spam run starting on Saturday 13th January, and increasing in volume to huge levels on Monday. From:    Florine Fray [Fray.419@redacted.tld] Date:    15 January 2018 at 10:51 Subject:    Could this digital currency actually make you a millionaire? Every once in a […]

Continue Reading » (2017/12/04_18:50)

By on December 4, 2017 in Malware Domains

Host:, IP address:, ASN: 13335, Country: US, Description: phishing/fraud

Continue Reading »

Some random thoughts on Damian Green and those porn allegations

By on December 4, 2017 in Latest SPAM

If you live in the UK then you might have noticed the somewhat bizarre furore over Damian Green MP and his alleged viewing of pornography on house his Parliament computer. Now, I don’t know for certain if he did or didn’t, but to put it in context his private email address also allegedly turned up […]

Continue Reading »

ST17-001: Securing the Internet of Things

By on November 16, 2017 in Recent Vulnerabilities

Original release date: November 16, 2017 The Internet of Things refers to any object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices that interact with people and share information machine to […]

Continue Reading »