www.cyren.com Open in urlscan Pro
2606:4700:10::ac43:57b  Public Scan

Submitted URL: http://blog.cyren.com/articles/fake-bacs-remittance-emails-delivers-dridex-malware.html
Effective URL: https://www.cyren.com/blog/
Submission: On October 10 via api from DE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Partners
 * Support
 * Login
   * CYREN INBOX SECURITY LOGIN
   * CYREN CLOUD SECURITY LOGIN
   * MYELEVEN LOGIN
   * PARTNER LOGIN

 * Products
   * * * Products
       * Inbox Security for Office 365
       * Threat InDepth
       * Incident Response Service
       
       * APIS AND SDKS
       
       * Malware Detection & Analysis Engines
       * URL Categorization Engine
       * URL Lookup API
       * Email Security Engine
       * Threat Intelligence
     
     * * IN THE NEWS
         
         Online Businesses Become a Phisher’s Playground
         Not nearly enough businesses have deployed sufficient security measures
         against phishing attacks through website builders and CMS
         platforms.Read Article on DarkReading >
         
         Go to Newsroom >
 * Solutions
   * * * Solutions
       * Anti-Phishing Solutions
       * Account Takover Protection
       * Business Email Compromise Protection
       * Ransomware Protection
     
     * * EXPERT SUPPORT
         
         Cyren’s dedicated security analysts have the expertise to deeply
         investigate sophisticated threats – their embedded documents and messy
         code.
         
         And from their vantage point across companies, geographies, and
         industries, analysts can track emerging attack vectors and prevent
         breaches.
         
         “For any false positive or user reported items, we do not need to be
         involved. Cyren’s dedicated team is on top of all these items.”
         
         via Gartner Peer Insights
 * Resources
   * * * Resources
       * Webinars & Events
       * Research & Reports
       * Case Studies
       * Product Datasheets
       * Blog
     
     * * RECENT POSTS
         
         * What is Microsoft Office 365 Advanced Threat Protection? September
           12, 2022
         * The Hidden Costs of Phishing & BEC August 25, 2022
         * 3 Ways to Optimize Your Security Awareness Training Program August
           23, 2022
 * Company
   
   * * * COMPANY
       
       * About Cyren
       * Careers
       * Management
       * Investor Relations
       * Press Releases
       * In the News
       * Contact Us
     
     * * IN THE NEWS
         
         Online Businesses Become a Phisher’s Playground
         Not nearly enough businesses have deployed sufficient security measures
         against phishing attacks through website builders and CMS
         platforms.Read Article on DarkReading >
         
         Go to Newsroom >
 * GET A DEMO

Select Page


CYREN SECURITY BLOG

The Cyren Security Blog is where Cyren engineers and thought leaders provide
insights, research and analysis on a range of current cybersecurity topics.


FEATURED POST


HOW THE WAR IN UKRAINE HAS INFLUENCED THE SCAMMERS’ UNDERGROUND

Jun 16, 2022 | Phishing, Security Research & Analysis

by Ira Chernous For the past three months, most media news headlines have been
talking about a painful subject that leaves no one indifferent: the war. Since
the start of the Russian invasion of Ukraine, the international community has...

read more

CATEGORIES

 * Business Email Compromise
 * Continuous Remediation
 * Incident Response
 * Malware
 * Office 365
 * Phishing
 * Security Awareness
 * Security Research & Analysis


LATEST POSTS


WHAT IS MICROSOFT OFFICE 365 ADVANCED THREAT PROTECTION?

Office 365

Office 365 Advanced Threat Protection (also known as ATP and Defender) can
provide your organization with advanced security features - keeping you
protected from cybersecurity threats. With today's cybersecurity landscape,
where new threats appear daily, if not...


PROTECT OFFICE 365 EMAIL FROM RANSOMWARE

Office 365

Ransomware is continually evolving. It has become the “most prominent malware
threat”, with experts estimating that ransomware attacks in 2021 resulted in
total damage costs of $20 billion. While there is no ransomware that
specifically targets Office 365 data, it can...


HOW THE WAR IN UKRAINE HAS INFLUENCED THE SCAMMERS’ UNDERGROUND

Phishing, Security Research & Analysis

by Ira Chernous For the past three months, most media news headlines have been
talking about a painful subject that leaves no one indifferent: the war. Since
the start of the Russian invasion of Ukraine, the international community has
been helping the victims by...


THE HIDDEN COSTS OF PHISHING & BEC

Security Research & Analysis

By Max Avory A couple of months ago we sat down with Damian Stalls, vCIO
director at Fluid Networks to discuss how they dramatically reduced the time
their security analysts spent managing the problem of phishing, BEC, and user
education. Here were some of the...


EMAIL HIJACKING DELIVERS QAKBOT MALWARE

Malware, Security Research & Analysis

by Dexter To and Maharlito Aquino Introduction Originally a banking Trojan that
existed in the wild as early as 2007, Qakbot (or QBot) is a pioneer of malware
as a service, which is continually maintained and developed to this day. While
its main purpose is to steal...


THE RESURGENCE OF EMOTET

Malware, Security Research & Analysis

by Kervin Alintanahim Password Protected Docs One of the most recent Emotet
samples we received were emails with password protected attachments. Although
the malicious document needs an extra step to be accessed compared to just being
attached as it is, the additional...


3 WAYS TO OPTIMIZE YOUR SECURITY AWARENESS TRAINING PROGRAM

Security Awareness

By Mike Fleck Despite investments of time and money in secure email gateways,
phishing threats continue to be delivered to the user's inbox. To close this gap
in automated detection, many organizations roll out user security awareness
programs to train their employees...


EXAMPLE ANALYSIS OF MULTI-COMPONENT MALWARE

Malware, Security Research & Analysis

by Kervin Alintanahin Recently, we have received an increase in the number of
malicious email samples with password-protected attachments. The recent waves of
attacks with Emotet use a similar approach. In this blog we describe our
analysis of another set of samples...


MALICIOUS EXCEL ADD-IN VARIANT DELIVERS MALWARE

Malware, Security Research & Analysis

By Floser Bacurio Jr XLL is an Excel Add-in extension file that provides ways to
use third-party tools and functions that are not available in Microsoft Excel.
It is typically a Dynamic Link Library (DLL) file that can be loaded by
Microsoft Excel provided the file...

« Older Entries



CYREN PROTECTS 1.3 BILLION USERS AGAINST EMERGING THREATS




CONTACT

americas-sales@cyren.com
emea-sales@cyren.com
apac-sales@cyren.com

 * Company
 * Partners
 * Careers
 * Investor Relations
 * Contact Us
 * Terms of Use
 * Privacy Policy
 * Cookie Policy

 * Company
 * Partners
 * Careers
 * Investor Relations
 * Contact Us
 * Terms of Use
 * Privacy Policy
 * Cookie Policy

© Cyren 2022. All trade/service marks or names referenced on this site belong to
their respective owners. The information contained herein is subject to change
without notice.





PRIVACY PREFERENCE CENTER




YOUR PRIVACY


YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.

More information about our cookies


 * STRICTLY NECESSARY COOKIES
   
   
   STRICTLY NECESSARY COOKIES
   
   Always Active
   Strictly Necessary Cookies
   
   These cookies are necessary for the website to function and cannot be
   switched off in our systems. They are usually only set in response to actions
   made by you which amount to a request for services, such as setting your
   privacy preferences, logging in or filling in forms.    You can set your
   browser to block or alert you about these cookies, but some parts of the site
   will not then work. These cookies do not store any personally identifiable
   information.
   
   Cookies Details‎


 * PERFORMANCE COOKIES
   
   
   PERFORMANCE COOKIES
   
   Performance Cookies
   
   These cookies allow us to count visits and traffic sources so we can measure
   and improve the performance of our site. They help us to know which pages are
   the most and least popular and see how visitors move around the site.    All
   information these cookies collect is aggregated and therefore anonymous. If
   you do not allow these cookies we will not know when you have visited our
   site, and will not be able to monitor its performance.
   
   Cookies Details‎


 * TARGETING COOKIES
   
   
   TARGETING COOKIES
   
   Targeting Cookies
   
   These cookies may be set through our site by our advertising partners. They
   may be used by those companies to build a profile of your interests and show
   you relevant adverts on other sites.    They do not store directly personal
   information, but are based on uniquely identifying your browser and internet
   device. If you do not allow these cookies, you will experience less targeted
   advertising.
   
   Cookies Details‎

Back Button


ADVERTISING COOKIES

Filter Button
Consent Leg.Interest
Select All Vendors
Select All Vendors
Select All Hosts

Select All

 * REPLACE-WITH-DYANMIC-HOST-ID
   
   
   33ACROSS
   
   33ACROSS
   
   View Third Party Cookies
   
    * Name
      cookie name

 * REPLACE-WITH-DYANMIC-VENDOR-ID
   
   
   33ACROSS
   
   3 Purposes
   
   View Privacy Notice
   
   
   
   33ACROSS
   
   3 Purposes
   
   View Privacy Notice
   
   REPLACE-WITH-DYANMIC-VENDOR-ID
   
   Consent Purposes
   
   Location Based Ads
   
   Consent Allowed
   
   Legitimate Interest Purposes
   
   Personalize
   
   Require Opt-Out
   
   Special Purposes
   
   Location Based Ads
   
   Features
   
   Location Based Ads
   
   Special Features
   
   Location Based Ads



Clear Filters

Information storage and access
Apply
Confirm My Choices Allow All



ON CYREN.COM WE USE COOKIES TO IMPROVE YOUR USER EXPERIENCE.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy

Accept All Cookies
Cookies Settings