Products
Products
Awareness
Detection
Response
Intelligence
About Cofense
About Cofense
Leadership
FAQs for PhishMe Submerge
Registration & Event Information How do I register? Please use the…
Learn More
FAQs for PhishMe Submerge
Registration & Event Information How do I register? Please use the…
Learn More
Free Tools
Free Tools
Create Transparency
Speed Response
Resources
Resources

Cofense Blog

STAY CURRENT ON INDUSTRY TRENDS & COFENSE NEWS

PhishMe Takes Home 2016 SC Magazine Award for Best IT Security-Related Training Program

March 3, 2016 by Cofense in Cofense NewsPhishingPress Releases

Judges Recognize Human Phishing Defense Solution Used by Fortune 500 Enterprises to Protect Data and Systems Against Multi-Billion Dollar Phishing Threat LEESBURG, Va. & SAN FRANCISCO – March 3, 2016 – PhishMe® Inc., the leader in human phishing defense solutions, today announced that SC Magazine honored the company with a 2016 SC Award for Best IT and Security Training Program. Winners of this prestigious award were chosen after undergoing a rigorous judging process that included testimonials, industry assessments and additional research. PhishMe was hand-picked by a panel of judges for its outstanding service, qualifications and advancements to the cybersecurity industry.

READ MORE

PhishMe Releases Channel-Exclusive Human Phishing Defense Solution for SMBs for Launch of Formal Channel Program

March 3, 2016 by Cofense in Cofense NewsPhishingPress Releases

Trusted Leader in Phishing Defense Expands Offerings to Global Customers Through Expanded Distribution Channels and New Product Offering LEESBURG, Va. & SAN FRANCISCO – March 3, 2016 – PhishMe® Inc., the leading provider of human phishing defense solutions, today unveiled during RSA 2016 the PhishMe Channel Alliance, a formalized channel distribution program designed to bring premier PhishMe security solutions to the global market. Following PhishMe’s record-breaking 892 percent growth over the last three years, the company is kicking off its global channel efforts by releasing a new solution available exclusively through the channel and made specifically for small and medium-sized...

READ MORE

PhishMe Technology Alliance Program Creates Integrated Ecosystem of World’s Leading Security Providers

March 2, 2016 by Cofense in Cofense NewsPhishingPress Releases

Join PhishMe at RSA 2016 (S1021) to Learn How Joint Customers Maximize Investments in FireEye, HP Enterprise, IBM, LogRhythm, Splunk, OpenDNS and Recorded Future LEESBURG, VA & SAN FRANCISCO — March 2, 2016—PhishMe® Inc., the leading provider of human phishing defense solutions, today announced the launch of the PhishMe Technology Alliance Program (TAP), comprised of an ecosystem of leading security providers and multiple, key technical integrations. The alliance provides joint customers with easy and effective integrations that strengthen security, improve operational workflow and manageability, maximize security investments and reduce the risk of falling victim to phishing-driven cyberattacks.

READ MORE

More Tax Time Scams

March 1, 2016 by Cofense in Phishing

Every year, attackers try to find some way to innovate and steal more money come tax time. Last year, attackers took advantage of e-filing, which led TurboTax to put a halt on all refunds due to a surge in fraudulent state tax returns. Here is a screenshot of a phishing email that the attackers are using to try and obtain W2’s for all employees: Be on the lookout for these types of scams! Snapchat recently fell victim to one of these scams and did the responsible thing by notifying the affected parties and called on the assistance of the FBI....

READ MORE

PhishMe Unveils Fully Integrated Phishing Defense Solution to Combat Multi-Billion Dollar Phishing Problem

March 1, 2016 by Cofense in Cofense NewsPhishingPress Releases

Human Conditioning, Intelligence and Incident Response Overcome Failing Automation Technology Patchwork LEESBURG, VA & SAN FRANCISCO — March 1, 2016— PhishMe® Inc., the leading provider of human phishing defense solutions, today announced during RSA Conference 2016 that it has fully integrated its powerful product suite comprised of Simulator, Reporter, Triage and Intelligence. The integration delivers customers with a comprehensive solution for attack identification, human-verified intelligence and incident response that turns employees into the most powerful line of defense against phishing. As the top attack vector in use today, spear phishing is responsible for more than 90 percent of all breaches...

READ MORE

PhishMe® Triage Integrates with Recorded Future’s® OSINT Platform for Investigative Incident Response

February 29, 2016 by Cofense in Phishing

Phishing Incident Response – Back to the Past, Present, and Recorded Future Attackers like to boast about their accomplishments as well as announce their plans. They leave trails of evidence across the open web just waiting to be discovered, if you’re looking in the right places. Similarly, as events occur, researchers and those attacked begin to share information. Employees within our organizations are a primary target of attackers with well-crafted spear phishing emails and some of which may stem from over sharing or whatever is personally newsworthy. Indicators of compromise (IOCs) help security teams in their incident response process. Has...

READ MORE

PowerPoint and Custom Actions

February 23, 2016 by Cofense in Phishing

We’ve recently observed a Phishing attack which uses PowerPoint Custom Actions instead of macros to execute a malicious payload. Although using PowerPoint attachments is not new, these types of attacks are interesting as they generally bypass controls that assert on macro enabled Office attachments.

READ MORE

Locky – New Malware Borrowing Ideas From Dridex and Other Ransomware

February 17, 2016 by Cofense in Phishing

On February 16, 2016, PhishMe’s Intelligence team identified a number of significantly large sets of emails delivering Word documents containing macro scripts used to download a malware payload. This malware delivery technique has been ubiquitous among many threat actors over the past year but has been most prolifically used by threat actors delivering the Dridex financial crimes trojan. The scope of Locky’s delivery in its first full day of deployment is staggering. As our friends at Palo Alto Networks have shown, over 400,000 endpoints around the world were affected by this encryption ransomware in mere hours. As we pointed out...

READ MORE

Dridex Experimenting with New Attack Vectors

February 10, 2016 by Cofense in Phishing

A few weeks ago, we posted an article about how Dridex is experimenting with different families of malware and techniques. When one threat actor starts shifting TTP’s, it’s usually a big deal. Attackers get comfy in their infrastructure, some survive sinkholes, and they continue spamming or stealing money. One shift takes time, effort, and money on the attackers part. The part that people often forget is that attackers need people to maintain backends, code the malware, code panels, and patch exploits as researchers find them, or else they are going to be exploited by said researchers.

READ MORE

FluxerBot: Nginx Powered Proxy Malware

February 4, 2016 by Cofense in Phishing

What first appeared last week to be yet another malspam campaign solely spread to infect victims with Andromeda, also downloaded some interesting second stage payloads; including several keyloggers and what was later discovered to be labeled as the Fluxer proxybot. The initial malspam lures contained Italian language informing its victims that he or she has received an invoice as the message attachment. The message attachment is a ZIP archive which contained the Andromeda malware installer. More information about this campaign can be found by ThreatHQ customers in Threat ID 5316.

READ MORE

McAfee’s “Groundbreaking” Phishing Study

July 5, 2007 by Cofense in Phishing

Recently, I came across a press release by McAfee citing the results of a “groundbreaking” study that talks about the psychological games played by phishers and email scam artists. The results of the study indicated that “cyber criminals use fear, greed and lust to methodically steal personal and proprietary financial information”. Frankly, I didn’t see anything groundbreaking in those results. Don’t we all know that social engineers (including phishers) have to play with people’s psyches to get them to click on links and submit personal information? The study did however quote some interesting statistics from a 2006 Gartner study: Cumulative loses stemming...

READ MORE