June Security Roundup | Atomic Stealer updates, MITRE mapping, breach trends & more
We keep a tight pulse on?malware trends, and one of the more interesting infostealer families is Atomic Stealer, which notoriously targets macOS devices.
We wanted to learn more about it, so we reverse-engineered it to uncover:
There’s no question Atomic packs a solid punch, able to capture things like admin and keychain passwords, sensitive system information, as well as credentials and browser information from Chrome, Firefox, and other applications on a victim’s computer. Listen in to a recap of our findings or read our latest blog for details, including what defenders should be on the lookout for and how to properly remediate exposures stemming from Atomic infections.
Trending?
In this article, we explore cybercriminal behavior relating to two phases of the MITRE ATT&CK framework – Reconnaissance and Resource Development – and why it’s critical to account for stolen data in your larger detection and attack prevention strategies.
?
The annual Verizon Data Breach Investigations Report (DBIR) is full of critical insights and trends, but at over 100-pages, it can be overwhelming. Our team breaks down key findings and takeaways in this blog post.
In Case You Missed It...
Last month, over 87 million records, including over 57 million distinct email addresses and over 39,000 passwords, were leaked from 3 databases tied to The Post Millennial news outlet. See what we found upon parsing and analyzing the data, and get recommendations to minimize your risk following the breach.
?
If your Zero Trust architecture doesn’t continuously monitor for and remediate identity exposures that can bypass your authentication systems (like MFA and SSO), your organization may be open to unintended risk. This blog outlines steps you can take to pivot to a Continuous Zero Trust framework.
领英推荐
SpyCloud Labs
?
In light of the continuing stream of high-profile and public cyber incidents, we wanted to shed some light on SpyCloud’s approach to responsibly disclosing breach and malware data to victims. Learn more about our RD Team and their proactive process.
NEW Product
Credit cards, gift cards, and loyalty cards exposed on the dark web put financial institutions and retailers at risk. With the new SpyCloud Compromised Credit Card API, you can query your own BIN(s) to proactively scan issued cards for compromise, and remediate exposures before fraud can occur.
In Other News
SpyCloud's Chief Product Officer Damon Fleury breaks down the key ingredient missing from a more robust and continuous Zero Trust approach?– monitoring for and proactively remediating compromised session cookies.
Upcoming Events
Black HatUSA | Las Vegas, NV,?August 6-8: We are going big this year. Stop by our booth #4424 and meet our team.
Annual IAFCI ConferenceUSA | Henderson, NV, Aug 26-30: We will be presenting a live demo of INV on 8/28 at 9AM PST with our Sr. Investigator.
What Do Criminals Know About Your Organization?
Ignorance is not bliss. Know immediately if your domain has malware-siphoned data circulating in the criminal underground with a simple search.