Social Engineering: First Salvo of a Hack

When most people think of computer hacking the natural inclination is to picture a socially awkward early twenty-something. He’s locked in his basement somewhere pecking away at a keyboard in the dark. While this assumption may have some basis in the truth, all too often modern hacking involves a much … Read More

Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

North Korea Turns to Cryptocurrency

The government of North Korea has, over the last few years, been largely cut off from the global economy due to their civil rights abuses, intercontinental ballistic missile launches, and nuclear weapons development. To attempt to feed their starving population and maintain control, they’ve now turned to hacking cryptocurrency. The … Read More

Zyklon Malware Resurgence

FireEye recently reported a resurgence of the Zyklon HTTP malware, which leverages three new vulnerabilities in Microsoft Office.  This sophisticated malware, originally detected in early 2016, has been observed targeting telecommunication, insurance, and financial service industries through spear phishing attacks.  Once a host has been infected, Zyklon conducts command and … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one: http://mccann-cyber.com/recovering-bitpaymer-ransomware-pt1/   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More

Recovering from BitPaymer Ransomware – Part 1

This is part one of a two-part special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Ransomware is a malicious type of software that infects a computer by writing code that encrypts or blocks access to the files on the computer … Read More

Assessing the Cybercrime Epidemic

For several years now, the impact of cybercrime on our society has been rising within the public consciousness.  A decade or more ago, the only people concerned with cybercrime were certain specialists whose lives were directly impacted.  Over the last decade or so, we’ve witnessed a dramatic increase in smart … Read More

Ransomware on the Rise

Cyber criminals are coming for your data and money. The FBI reported an increase in cyber attacks, specifically ransomware. Hospitals, school districts, state and local governments, small businesses, large businesses, academic institutions, and law enforcement are all among the top targets for these attacks. Organizations face the possibility of immense … Read More

Yahoo Yet Again

Yahoo recently disclosed a new security breach on December 14, potentially affecting more than one billion accounts. The breach first began back in 2013 and is believed to be separate from the similarly massive cybersecurity incident Yahoo announced back in September. Data stolen may include user names, email addresses and … Read More

Self Sabotage

Cases involving estranged or divorced spouses are always delicate. The situation only escalates when one of the parties worries the other is spying on them to gain leverage. Our forensic expert Brett handled a case involving a client who was convinced their estranged spouse put spyware on their mobile devices. … Read More