Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Cyber criminals have been developing new techniques designed to target smartphones and tablets. These attackers can earn hefty paydays for freshly harvested, mobile-based data as many users store valuable information in mobile apps or on their mobile devices.
“[mobile] is the jackpot when it comes to valuable data, so obviously bad guys are doing a lot of work to get at it,” says Jeremy Linden, Security Product Manager at security firm Lookout, in a recent Security Week article.
The author of the article also discusses findings by Lookout, which has been tracking the mobile-based malware known as NotCompatible. NotCompatible is designed to enslave host mobile devices in order to generate an army of zombie machines, commonly referred to as a botnet.
The article states that the most common way for NotCompatible to get onto a smartphone is when the victim visits a legitimate mobile website that’s been hacked. In essentially the same way web-based malware is spread, this malware secretly infects unsuspecting victims who were just visiting the wrong site at the wrong time.
From a security perspective, mobile websites are essentially regular websites but reformatted in order to be delivered on mobile devices instead of desktops and laptops. Mobile web browsers still rely on markup languages like HTML for serving up pages.
In typical website-based attacks, the goal is to manipulate the process by which the browser renders the DOM (webpage) by injecting malicious scripts into the process. Malware can be served up directly via malicious files, applets, .exes or via injected scripts causing website redirects to malicious URLs hosting drive-by downloadable malware.
Redirects to drive-by downloads were used to spread Svpeng malware, arguably the most dangerous mobile banking Trojan to date.
In the case of NotCompatible, the initial infection started on legitimate websites, which led to infrastructure hosting drive-by download malware designed to look like regular software updates that prompted victims to perform an install. Only instead of updating software, they were actually installing malware.
Brand-name websites can provide the best regular and mobile-based malware distribution targets because of their high traffic volumes due to their notoriety. Major brands also typically own many online assets that generate a higher percentage of potentially vulnerable websites and mobile applications to target.
It is getting harder and harder for enterprises to track and manage all their web assets, leading to repeated compromises that can often be of sites they aren’t even aware of. Websites are also at risk from the third-party code libraries being pulled in to prop up most large websites. This creates additional attack vectors, as was the case with the recent Syrian Electronic Army attack using Gigya to hack major brand name websites like CNBC.com, The Independent and NHL.com. The good news is that the entire campaign is at risk during the mass distribution phase. It’s only after it’s reached its target, in this case the end users, that most modern malware becomes difficult to detect (until its too late).
RiskIQ for Web is designed to detect embedded malware while it’s attempting to infect site visitors. The RiskIQ technology platform does this by sending out a massive army of automated, virtual users around the globe that are configured to look and act like real human on devices. Each virtual user can emulate a computer or smartphone. Their purpose is to experience our customer’s websites as a real user would. If they become infected during a scan, they can pinpoint the source of the infection by capturing the DOM and rebuilding the causality chain. Simultaneously, our system will either alert our customers’ security teams or take a predetermined action in order to eliminate the threat.
The most successful attackers will target websites, which, for various reasons, may be hidden from the brand they belong to. RiskIQ real-time asset discovery within the RiskIQ for Web bundle allows us to uncover troves of previously unknown websites that could be utilized to levy attacks. Typically, they’re somehow tied to the brand’s domain, ASN or bare markings like logos and trademarks associated with the brand.
RiskIQ customers can quickly and easily lower the risk of malware campaigns leveraging their assets. In the process they can stem the spread of harmful malware by protecting those that leverage their web assets the most: customers and employees.
Tomorrow: RiskIQ's @joshuamayfield sits down with @forrester's @josh_zelonis to discuss what goes into a next-gen vulnerability management program, and why discovering unknowns is where it all starts: https://t.co/kCxgPVJ1sD
What are the keys to a Modern Vulnerability Risk Management Program? On Tuesday, @joshuamayfield and @josh_zelonis will examine why defending your organization's digital attack surface starts with being able to discover unknowns and investigate threats: https://t.co/kCxgPW0Ckb
IGNITE is just 10 days away! RSVP now to kick off #RSAC and party with Flashpoint, @elastic, @ThreatQuotient, @Siemplify, and @RiskIQ: https://t.co/hnlh0UhHEo
The largest UK #GDPR fine was £183m in 2018 as B.A. booking website was hit by Magecart ccard skimming code. @RiskIQ worked with https://t.co/E3JRdvCMWA and Shadowserver to take down the malicious domains. https://t.co/iiH69vbKFK