Preview Pain: Malware Triggers in Outlook Preview Without User Opening Word Document

2019-02-13T20:43:41+00:00February 13th, 2019|Threats|

A recent malware sample forwarded to our Threat Intelligence service had some very interesting properties which we think would be useful to share. The sample itself is a Word document which is emailed as part of a phishing attack. If the user interacts with the document, it would download a payload to run on the [...]

Super Mario Oddity

2019-02-11T05:33:06+00:00February 8th, 2019|Threats|

A few days ago, I was investigating a sample piece of malware where our static analysis flagged a spreadsheet as containing a Trojan but the behavioural trace showed very little happening. This is quite common for various reasons, but one of the quirks of how we work at Bromium is that we care about getting malware to run and [...]

Emotet: How It Might Infect Your PC

2019-02-05T12:25:11+00:00February 4th, 2019|Threats|

The most prolific malware that Bromium has been seeing in customer environments over the last three months has been Emotet. Since this appears to be the preferred malware campaign of the moment, I wanted to give a technical breakdown on how your PC might get infected by Emotet. I won’t drill into every detail of [...]

Magellan and the Security Pitfalls of Third-Party Code

2018-12-22T07:22:47+00:00December 22nd, 2018|Threats|

The Security Pitfalls of Third-Party Code As the web evolves, webpages are offering new powerful and interactive features Vulnerabilities in these features may allow remote attackers to run malware on your machine Bromium uses hardware-enforced isolation to protect against these attacks by design The recent Magellan vulnerability in SQLite allows attackers to exploit affected applications [...]

Data Talks: Why Customers Trust Bromium to Let Malware Run on their Endpoints

2018-12-05T08:16:28+00:00December 5th, 2018|Threats|

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solutions try to terminate malware upon discovery to minimize breaches, but often act too late and sacrifice learning Let malware run. All of it. Ransomware, [...]

Data Talks: Deeper Down the Rabbit Hole: Second-Stage Attack and a Fileless Finale

2018-12-05T08:17:22+00:00November 5th, 2018|Threats|

­­In our last blog, “Following a Trail of Confusion: PowerShell in Malicious Office Documents”, we systematically unraveled multiple layers of obfuscation initiated by a weaponized first-stage Microsoft Word document to reveal a surreptitious download script and a malicious second-stage binary file dropped onto the victim PC. For those who wish to follow the analysis through [...]

Bromium Announces Capture the Flag BYOM Challenge

2018-10-29T17:37:36+00:00October 29th, 2018|BYOM|

Bromium is announcing a Capture the Flag Bring Your Own Malware (BYOM) competition To win a $30,000 cash prize, you have to submit a sample of malware that successfully breaks out from our hardware-enforced containment and gains access to the flag file For details, rules, and submission instructions, visit www.bromium.com/byom This week, Bromium announced a [...]

Data Talks: Following a Trail of Confusion: PowerShell in Malicious Office Documents

2018-12-05T08:33:24+00:00October 2nd, 2018|Threats|

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously leveraged to gain a foothold into the enterprise. And why shouldn’t they? Macros provide a broad range of powerful [...]

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

2018-08-30T07:38:33+00:00August 30th, 2018|Threats|

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it’s critical to secure their ultimate targets, the vulnerable applications Welcome to the third edition of the Bromium Threat Labs Data [...]

Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

2018-08-22T09:27:13+00:00August 22nd, 2018|Threats|

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security concerns The clear majority of threats reaching endpoints today arrive via email attachments and browser file downloads Welcome to the second installment of [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close