Raccoon Malware

Raccoon is generally delivered through phishing campaigns and exploit kits. Fraudulent emails sent to would-be victims contain Microsoft Office document attachments with malicious macros, whereas the exploit kits are usually hosted on websites.

Victims are profiled for any potential browser-based vulnerabilities and based on this analysis, they are redirected to the appropriate exploit kit.

Source: ZDNet

How do you protect yourself?

Proper security measures must be in place to defend against Raccoon malware and similar threats. Having proper up-to-date endpoint security provides a cross-generational blend of threat defense techniques to protect systems from malware.

CVE-2020-6418

Google has released today a Chrome update to address three security bugs, including a zero-day vulnerability that is being actively exploited in the wild.

Source: Chrome

How do you protect yourself?

Patches for this zero-day will be available in Google Chrome 80.0.3987.122 for Windows, Mac, and Linux, which will roll out over the coming days/weeks.

DoppelPaymer Ransomware

The operators of the DoppelPaymer Ransomware have launched a site that they will use to shame victims who do not pay a ransom and to publish any files that were stolen before computers were encrypted.

DoppelPaymer is an enterprise-targeting ransomware that compromises a corporate network, eventually gains access to admin credentials, and then deploys the ransomware on the network to encrypt all devices. As these attacks encrypt hundreds, if not thousands, of devices, they tend to have a huge impact on operators and the attackers demand a very large ransom.

Source: BleepingComputer

How do you protect yourself?

Proper security measures must be in place to defend against DoppelPaymer Ransomware and similar threats. Having proper up-to-date endpoint security provides a cross-generational blend of threat defense techniques to protect systems from malware.