Observing a Reset in Ransomware and a Rise in Botnet Malware, PhishMe Responds by Providing All Customers with New Malware Analysis Feature
Phishing Defence Leader Provides Regional Client Support to Mitigate Threats and Leverage Phishing Expertise
LONDON, UK – June 1, 2017: PhishMe Inc., the leading provider of human phishing defence solutions, today announced the opening of their London Phishing Defence Centre (PDC). This new regional centre will provide clients with dedicated professional services to automate and orchestrate phishing incident response programmes utilising PhishMe Triage™ and PhishMe Intelligence™.
Partnership Extends Offering of PhishMe Solutions Across Australia, New Zealand and Oceania
MELBOURNE, AUSTRALIA – WELLINGTON, NEW ZEALAND – May 23, 2017: PhishMe Inc., the leading provider of human phishing defense solutions and Aquion, a focused software security distributor of IT products and services, announced a new strategic channel alliance. As a premier reseller and distributor, Aquion will help to accelerate the rapid growth that PhishMe has achieved across Australia and New Zealand.
Aquion specializes in bringing innovative and emerging technologies to the Australia/New Zealand and APAC marketplaces. Aquion’s sales and technical resources are vendor trained and certified to deliver a high level experience to customers. The strategic alliance will benefit customers across the region, with PhishMe’s human intelligence-driven anti-phishing solutions augmenting Aquion’s comprehensive security technology portfolio. Together, PhishMe and Aquion will help to protect organisations from today’s advanced security threats.
Audrey Lyon, Sales Manager of Aquion said “We’re excited about this collaboration which provides us with excellent opportunities, as PhishMe’s defense solutions offer a number of unique benefits to organisations throughout the Asia Pacific region. PhishMe’s innovative approach presents customers with a comprehensive and scalable human phishing defense solution, to help tackle the pressing issue of the number one attack vector – phishing. We know our customers are struggling with phishing attacks that are growing in complexity and frequency. Our relationship with PhishMe will certainly enhance the Aquion Security business unit which helps customers monitor, manage, and secure all elements of enterprise infrastructure using the best technologies.”
PhishMe’s phishing incident response platform and phishing threat intelligence enables Security Operations Centre and Incident Response teams to respond faster to real threats – decreasing the risk of data breaches. Its intelligence-driven solutions empower employees to be an active line of defense and source of attack intelligence by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. The company has received a range of respected industry awards over the course of the last year, and recently announced record year-on-year growth.
“Collaboration with industry leading IT and security companies such as Aquion extends our reach to a greater number of customers facing an unprecedented increase in frequency and damage caused by cyberattacks,” explained Jim Hansen, Chief Operating Officer, PhishMe. “PhishMe is the only security company that provides a comprehensive and scalable human phishing defense solution. Through our alliance with Aquion, we are giving organizations across the Oceania region the security solutions and intelligence they need to proactively detect and quickly respond to cyber attacks.”
PhishMe and Aquion will both be exhibiting at AusCERT 2017, taking place at the Surfers Paradise Marriott in Gold Coast, Australia from 23-26 May, 2017. Please visit PhishMe in booth S29 and Aquion in booth S17 for more information.
Connect with PhishMe Online
- Follow PhishMe on Twitter: https://twitter.com/phishme
- Follow PhishMe’s Blog: http://cofense.com/blog/
- Follow PhishMe on LinkedIn: https://www.linkedin.com/company/phishme-inc-
PhishMe is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector — spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization’s security decision making process. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior will improve security, aid incident response, and reduce the risk of compromise.
AxiCom for PhishMe Global
Phone: +44 (0) 20 8392 4061
Since 2000, Aquion has been making it easier for A/NZ and APAC enterprise and government customers and their resellers to source, implement and maintain software solutions which meet their specific business requirements.
Aquion’s business units focus on delivering:
- Innovative and emerging technologies to manage, monitor and secure data and infrastructure
- Software from thousands of vendors to corporate resellers providing an end to end solution for their customers
- Support and maintenance services to ensure all corporate software users have access to latest versions and vendor support
- Technical pre and post sales services to make choosing and installing the best software for the need easier
Our purpose of making business easier combined with our track record of consistent growth gives us confidence that Aquion will be bigger and stronger moving into the future.
Marketing and Communications Manager – Aquion
Phone: +61 2 8036 8025
Financial losses from business email compromise (BEC) scams skyrocketed by 2,370% between January 2015 and December 2016, according to an FBI public service announcement released Thursday. The alarming statistic represents a sharp increase from the agency’s previous announcement, serving as a warning to users to stay vigilant in recognizing the threat.
Over the past several days, the Phishing Defense Center identified and responded to several messages related to an ongoing phishing email campaign spoofing DocuSign to carry out an attack. These messages appear to be official DocuSign emails including links to review the document. Upon clicking the link, various malicious files are downloaded to the victim’s computer including the DELoader financial crimes malware.
Leesburg, VA – May 05, 2017 – PhishMe (cofense.com), the leading provider of human-phishing defense solutions, announced today that co-founders Rohyt Belani, CEO, and Aaron Higbee, CTO, have both been named 2017 Tech Titans by Washingtonian magazine. Every two years, the magazine identifies 100 influential people in the Washington, D.C. area technology scene from start-ups to Fortune 500 companies who have made substantial contributions to the community. The list is compiled based on research and interviews conducted between the editors and local technology leaders.
Leesburg, VA – May 3, 2017 – PhishMe (cofense.com), the leading provider of human-phishing defense solutions, today announced the availability of five new interactive modules for its complimentary computer-based training (CBT) program, CBFree. Unlike any other security awareness training programs on the market, CBFree is a unique, high-quality, and interactive experience that provides employees with free security awareness training for today’s top cybersecurity threats, including malware and spear-phishing.
Throughout April, our Phishing Defense Team observed an increase in malicious URLs that deliver the financial crimes and botnet trojan known as Geodo. These emails take a simple approach to social engineering, using just a sentence or two prompting the victim to click on a link to see a report or invoice that has been sent to them.
An example of a typical phishing email used in these attacks is shown below:
Below are some examples of subject lines we have observed:
Emails containing malicious links providing the PDF documents used to deliver this malware have also been found to contain the word “attachment” somewhere within in the subject line.
Once the Geodo payload is in place on the victim’s computer, it will connect to the Geodo command and control infrastructure allowing the attacker to collect sensitive information from the infected machine.
Listed below are command and control hosts that have been observed during our analysis:
The core functionality of the Geodo trojan lies in its ability to collect sensitive information from infected machines and their users. Sophisticated browser-based information stealing functionality provided by Geodo includes form grabs and HTTPS man-in-the-middle attacks. Geodo also sports the ability to produce new sets of phishing emails, delivering itself to new potential victims.
Full List of Geodo IOCs collected by the Phishing Defense Center
Infection URLs (Where the malware was originally downloaded from):
Command and Control hosts:
PhishMe cautions its customers to be wary of emails containing suspicious links or attachments. Specific to this sample, we recommend that customers be observant for unexpected emails that contain subject lines referring to invoices or attachments, and email bodies that ask you to visit a link to see an invoice or report. PhishMe Simulator customers may consider launching simulations that follow this style of attack to further train their users to detect and report suspicious emails.
Want to be notified of the latest malware strains and phishing threats? – sign up for our complimentary PhishMe Threat Alerts service, delivered straight to your inbox.