Social Engineering: First Salvo of a Hack

When most people think of computer hacking the natural inclination is to picture a socially awkward early twenty-something. He’s locked in his basement somewhere pecking away at a keyboard in the dark. While this assumption may have some basis in the truth, all too often modern hacking involves a much … Read More

Darknet, Bitcoin, and Murder for Hire

Stephen Allwine was found guilty 31 January, 2018 for the Darknet related murder of his wife and staging her death as a suicide. Traditional investigation may have been enough to ensure the delivery of a guilty verdict however the use of digital evidence played a very large roll in landing … Read More

Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

Blockchain Data Mining by Police

Cryptocurrency, particularly bitcoin, first came into the spotlight largely in part due to its relation with illegal drug transactions over the Darknet. The U.S. Immigration and Customs Enforcement (ICE) has revealed they are now tracking transactions on the blockchain made by illegal drug traffickers attempting to cover their trail through … Read More

North Korea Turns to Cryptocurrency

The government of North Korea has, over the last few years, been largely cut off from the global economy due to their civil rights abuses, intercontinental ballistic missile launches, and nuclear weapons development. To attempt to feed their starving population and maintain control, they’ve now turned to hacking cryptocurrency. The … Read More

Zyklon Malware Resurgence

FireEye recently reported a resurgence of the Zyklon HTTP malware, which leverages three new vulnerabilities in Microsoft Office.  This sophisticated malware, originally detected in early 2016, has been observed targeting telecommunication, insurance, and financial service industries through spear phishing attacks.  Once a host has been infected, Zyklon conducts command and … Read More

Lebanese Hacking Continues

A state-sponsored hacking group called the Dark Caracal, linked to the Lebanese government, has an ongoing attack effecting desktops and Android. They have been found to be engaging in cyber espionage and data theft against 21 countries or more.  They have stolen hundreds of gigabytes of personal data. Their attacks … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one: http://mccann-cyber.com/recovering-bitpaymer-ransomware-pt1/   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More

ICO Warning: 10% of Proceeds Hacked

Ernst & Young conducted a study of 372 initial coin offerings put out in 2017 and tracked the ICO funding patterns.  Last year investors and coin fans pumped around $3.7 billion into ICOs, but EY found that around $400 million of that money ended up in the hands of hackers.   … Read More