Social Engineering: First Salvo of a Hack

When most people think of computer hacking the natural inclination is to picture a socially awkward early twenty-something. He’s locked in his basement somewhere pecking away at a keyboard in the dark. While this assumption may have some basis in the truth, all too often modern hacking involves a much … Read More

Traveling Abroad: Safe & Aware

Depending on the country being visited,  traveling abroad can be no more dangerous than the parking lot of Disney Land.   In some other countries significant security risks are present.    In many latin American countries kidnapping and extortion are the national past time. A good place to start is … Read More

Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

Deleted Is Not Really Deleted?

A commonly held adage in the field of digital forensics is that “Nothing is ever really deleted”.  A recent announcement by the Department of Justice regarding the missing Strzok/Page text messages completely supports that line of thinking.  In an article posted on the Fox News Channel website (Jake Gibson & … Read More

Blockchain Data Mining by Police

Cryptocurrency, particularly bitcoin, first came into the spotlight largely in part due to its relation with illegal drug transactions over the Darknet. The U.S. Immigration and Customs Enforcement (ICE) has revealed they are now tracking transactions on the blockchain made by illegal drug traffickers attempting to cover their trail through … Read More

North Korea Turns to Cryptocurrency

The government of North Korea has, over the last few years, been largely cut off from the global economy due to their civil rights abuses, intercontinental ballistic missile launches, and nuclear weapons development. To attempt to feed their starving population and maintain control, they’ve now turned to hacking cryptocurrency. The … Read More

Zyklon Malware Resurgence

FireEye recently reported a resurgence of the Zyklon HTTP malware, which leverages three new vulnerabilities in Microsoft Office.  This sophisticated malware, originally detected in early 2016, has been observed targeting telecommunication, insurance, and financial service industries through spear phishing attacks.  Once a host has been infected, Zyklon conducts command and … Read More

Lebanese Hacking Continues

A state-sponsored hacking group called the Dark Caracal, linked to the Lebanese government, has an ongoing attack effecting desktops and Android. They have been found to be engaging in cyber espionage and data theft against 21 countries or more.  They have stolen hundreds of gigabytes of personal data. Their attacks … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one: http://mccann-cyber.com/recovering-bitpaymer-ransomware-pt1/   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More