Feed aggregator

Gooligan- The recent Hooligan that is spreading

ThreatSTOP - Fri, 12/23/2016 - 12:15

One criteria for the success of malware is its scope of distribution. Gooligan, a mobile malware, found in the app SnapPea that is described as a "one-stop shopping experience", has succeeded in this aspect. Check Point reported that this malware has breached more than 1 Million Google accounts. This malware has been distributed through apps that are available in third party Android stores. In order to increase the number of downloads for these apps, and in turn the malware, there have also been phishing campaigns which contained download links, sent through various messaging services.

New Phishing Protection

ThreatSTOP - Thu, 12/22/2016 - 10:16

The ThreatSTOP Security Team has introduced a new list of Phishing protection in order to help our customers to protect themselves from Phishing and at the same time to maintain a separation between targets with different false positive chance.

Phishing is a technique used to gain private information for purposes of theft.

Biweekly Security Update

ThreatSTOP - Thu, 12/22/2016 - 00:27

Biweekly Security Update

Malicious content identified and inserted:

  • IPs – 232
  • Domains – 386

Target lists updated:



ThreatSTOP - Tue, 12/20/2016 - 00:14

Marcher is an evolving Android-based banking Trojan, changing in scope and capabilities since first seen in 2013. Spreading through phishing emails and websites, it prompts the victim to download “security updates” from third party app stores. It has also been found to spread through malicious apps on the Google Play Store itself.


ThreatSTOP - Tue, 12/20/2016 - 00:13


On November 30th, 2016, a worldwide cooperative takedown of the Avalanche botnet took place after more than four years of investigation.  “Avalanche” refers to a worldwide crimeware-as-a-service (CaaS) network infrastructure operated by cyber criminals conducting malicious activity. This includes: DDoS, malware distribution, phishing and money-mule operations causing hundreds of millions of damages in Euros worldwide.


ThreatSTOP - Tue, 12/20/2016 - 00:09
4.12 Release Notes

Reporting – The Legacy reporting link has been removed from the portal. All Legacy reporting information is available in the Next-Generation reporting UI.

 12.14 .16 Security Update

Malicious Content Identified & Inserted:

  • IPs – 166
  • Domains – 1288

Target Lists Updated:


ThreatSTOP 4.10 Release Notes

ThreatSTOP - Wed, 12/07/2016 - 18:24
ThreatSTOP 4.10 Release Includes:


Houdini's RAT Is No Disappearing Act

ThreatSTOP - Thu, 12/01/2016 - 20:34

Most creators of Trojans or worms only known attribution to their creation is made by security researchers, and although, these individuals are not known in person, some of them are known and active in the cybercriminal scene. One of these “celebrity cyber criminals” is known by his alias Houdini, and according to Threatgeek.com is named 'Mohamed Benabdellah'. Houdini is believed to be based in  Algeria and connected to njq8” (aka ‘Naser Al Mutairi’) the developer of other RATs as "njRAT" and "njw0rm".

DGAs For the Masses

ThreatSTOP - Thu, 12/01/2016 - 13:48

At ThreatSTOP, we strive to provide our customers with the most up-to-date and accurate protection from both known and emerging threats. Using the data provided by our friends at the Qihoo 360 research team we have constructed a target list of over 20 identified malware families. The malware families that we will be protecting you against are:

Don’t Pony Up Your Data to Fareit

ThreatSTOP - Wed, 11/30/2016 - 22:53

Fareit, also known as Pony, is a data stealing Trojan that can decrypt or unlock passwords for over 110 different applications, including VPN, FTP, email, instant messaging, web browsers and much more. It is also capable of stealing a victim’s bitcoin wallets. Once it has collected its victim's data, Fareit uploads these stolen credentials to a remote Command and Control (C2) server the criminal has access to. Fareit is very dangerous because its infection on a computer can make the device part of a botnet, allowing the malware to use it to infect other devices.

DNS Firewall: What Is It & Why Should You Have One?

ThreatSTOP - Mon, 11/28/2016 - 20:51

What's DNS?