Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
At the request of our customers, March 9th, RiskIQ’s team of trained intelligence analysts began compiling disparate data and intelligence related to COVID-19 into comprehensive daily reports. Each report combines major updates around COVID-19 and its impacts on cities, neighborhoods, schools, and businesses as well as essential cybercrime data that helps raise the situational awareness of both physical and cybersecurity teams.
This intelligence will help inform the decisions of security teams, who face new requirements during these unprecedented times. Here, RiskIQ strives to provide the security community with a single source of factual reporting and informed analysis to help the security community discover unknowns about their environment and investigate threats.
Download Full RiskIQ i3 Daily Report – 4/1
RiskIQ analyzed its spam box feed for the time period of 03/31/2020-04/01/2020. During this period, RiskIQ analyzed 173,164 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 19,479 unique subject lines observed during the reporting period. The spam emails originated from 10,997 unique sending email domains and 15,489 unique SMTP IP Addresses. Analysts identified 518 emails which sent an executable file for Windows machines.
———–
Download Full RiskIQ i3 Daily Report – 3/31
RiskIQ analyzed its spam box feed for the time period of 03/30/2020-03/31/2020. During this period, RiskIQ analyzed 217,169 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 15,692 unique subject lines observed during the reporting period. The spam emails originated from 9,592 unique sending email domains and 15,700 unique SMTP IP Addresses. Analysts identified 1,625 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/30
RiskIQ analyzed its spam box feed for the time period of 03/28/2020-03/30/2020. During this period, RiskIQ analyzed 439,972 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 40,099 unique subject lines observed during the reporting period. The spam emails originated from 41,839 unique sending email domains and 34,105 unique SMTP IP Addresses. Analysts identified 2,324 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/28
RiskIQ analyzed its spam box feed for the time period of 03/27/2020-03/28/2020. During this period, RiskIQ analyzed 81,823 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 9,739 unique subject lines observed during the reporting period. The spam emails originated from 11,856 unique sending email domains and 12,296 unique SMTP IP Addresses. Analysts identified 1,026 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/27
RiskIQ analyzed its spam box feed for the time period of 03/26/2020-03/27/2020. During this period, RiskIQ analyzed 265,952 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 20,588 unique subject lines observed during the reporting period. The spam emails originated from 31,734 unique sending email domains and 24,306 unique SMTP IP Addresses. Analysts identified 163 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/26
RiskIQ analyzed its spam box feed for the time period of 03/25/2020-03/26/2020. During this period, RiskIQ analyzed 229,298 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 15,905 unique subject lines observed during the reporting period. The spam emails originated from 34,043 unique sending email domains and 24,779 unique SMTP IP Addresses. Analysts identified 699 emails which sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/25
RiskIQ analyzed its spam box feed for the time period of 03/24/2020-03/25/2020. During this period, RiskIQ analyzed 181,189 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 17,051 unique subject lines observed during the reporting period. The spam emails originated from 28,661 unique sending email domains and 24,737 unique SMTP IP Addresses. Analysts identified 55 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/24
RiskIQ analyzed its spam box feed for the time period of 03/23/2020-03/24/2020. During this period, RiskIQ analyzed 204,303 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 22,747 unique subject lines observed during the reporting period. The spam emails originated from 35,529 unique sending email domains and 29,118 unique SMTP IP Addresses. Analysts identified 1,160 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/23
RiskIQ analyzed its spam box feed for the time period of 03/22/2020-03/23/2020. During this period, RiskIQ analyzed 243,881 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 38,698 unique subject lines observed during the reporting period. The spam emails originated from 40,849 unique sending email domains and 22,567 unique SMTP IP Addresses. Analysts identified 237 emails which sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/22
RiskIQ analyzed its spam box feed for the time period of 03/21/2020-03/22/2020. During this period, RiskIQ analyzed 160,648 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 27,560 unique subject lines observed during the reporting period. The spam emails originated from 15,980 unique sending email domains and 21,070 unique SMTP IP Addresses. Analysts identified 2 emails which sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/21
RiskIQ analyzed its spam box feed for the time period of 03/20/2020-03/21/2020. During this period, RiskIQ analyzed 193,133 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 39,760 unique subject lines observed during the reporting period. The spam emails originated from 14,127 unique sending email domains and 22,439 unique SMTP IP Addresses. Analysts identified 135 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/20
RiskIQ analyzed its spam box feed for the time period of 03/19/2020-03/20/2020. During this period, RiskIQ analyzed 202,558 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 20,387 unique subject lines observed during the reporting period. The spam emails originated from 14,232 unique sending email domains and 20,337 unique SMTP IP Addresses. Analysts identified 1,558 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/19
RiskIQ analyzed its spam box feed for the time period of 03/18/2020-03/19/2020. During this period, RiskIQ analyzed 268,382 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 20,271 unique subject lines observed during the reporting period. The spam emails originated from 14,279 unique sending email domains and 20,962 unique SMTP IP Addresses. Analysts identified 1,099 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/18
RiskIQ analyzed its spam box feed for the time period of 03/17/2020-03/18/2020. During this period, RiskIQ analyzed 215,490 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 20,131 unique subject lines observed during the reporting period. The spam emails originated from 15,198 unique sending email domains and 22,425 unique SMTP IP Addresses. Analysts identified 1,232 emails that sent an executable file for Windows machines.
Download Full RiskIQ i3 Daily Report – 3/17
RiskIQ’s External Threats platform identified 31 URLs that appear to be malicious. The platform discovered these URLs by cross-indexing automated searches of the keywords “COVID-19” and “Coronavirus” with malware and phishing detection tools.
RiskIQ analyzed its spam box feed for the time period of 03/13/2020-03/16/2020. During this four-day period, RiskIQ analyzed 437,887 spam emails containing either “*corona*” or “*covid*” in the subject line. There were 54,847 unique subject lines observed during the reporting period. The spam emails originated from 32,535 unique sending email addresses and 44,165 unique SMTP IP Addresses. Analysts identified 536 emails, which sent an executable file for Windows machines.
RiskIQFollow
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
RiskIQ's #COVID19 Daily Update for 4/1: ➡️Pentagon to send 2,000 ventilators to #FEMA and the #HHS ➡️US intelligence: China has under-reported cases and fatalities ➡️Carnival Cruise Line will raise ~ $6 billion in debt & equity Read the full update here: https://bit.ly/2Uv3CMV
RiskIQ's #COVID19 Daily #Cybercrime Update for 3/31: ➡️RiskIQ observed a large Iranian #malware campaign impersonating official #WHO representative ➡️#WHOIS reliability issues fueling COVID-19 cybercrime ➡️Updated #spam stats Read the full update here: https://bit.ly/2QwfRHS
"As we’re now all isolating ourselves and homebound, it means online purchases will spike and makes it a prime time for criminals." - @ydklijnsma. Read more about the 20% spike in #Magecart due to #COVID19 in @WIRED https://bit.ly/2UVaC5E
RiskIQ's #COVID19 Daily Update for 3/30: ➡️The U.S. confirms cases jumped by 108,302 (+307%) ➡️FBI warns hospitals of supply-chain scams ➡️FDA issues emergency authorization for the use of hydroxychloroquine and chloroquine Read the full update here: https://bit.ly/2Uv3CMV
According to @campuscodi, @sniko_ was able to use @PassiveTotal to link nine malicious QR code generator sites that have stolen $46,000 to three web servers, which hosted 450+ other websites—all with "shady-looking domains." Read more in @ZDNet https://zd.net/2QRPjkq