SPECIAL STATE PROTECTION SERVICE
SPECIAL COMMUNICATION AND INFORMATION
SECURITY STATE AGENCY

COMPUTER EMERGENCY
RESPONSE CENTER

Report Incident

Articles

Malware's Stinging Little Secret
21 Sept 2015

Malware's Stinging Little Secret

What do successful but separate malware attacks against banking customers around the world, as well as the White House and health insurer Anthem, all have in common?

Target Breach: MasterCard Weighs New Settlement
19 Sept 2015

Target Breach: MasterCard Weighs New Settlement

Target's Aug. 17 settlement with Visa to reimburse card issuers up to a reported $67 million for expenses related to the retailer's 2013 data breach may pave the way for a similar revised settlement ...

Bigger Stagefright: Another Bug Found in Android
16 Sept 2015

Bigger Stagefright: Another Bug Found in Android

here's more bad news for Android users. In the wake of the discovery of the serious Stagefright flaw, which affects an estimated 950 million devices, security researchers say they discovered yet ...

Apple Malware Outbreak: Infected App Count Grows
14 Sept 2015

Apple Malware Outbreak: Infected App Count Grows

The number of apps infected in the first large-scale Apple App Store malware outbreak is far higher than was first believed, according to the cybersecurity firm FireEye, which reports that at least ...

Stolen OPM Fingerprints: What's the Risk?
12 Sept 2015

Stolen OPM Fingerprints: What's the Risk?

The reported severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that substantially more government employees and contractors' fingerprint ...

Hackers Exploit Stolen Firefox Bug Information
7 Sept 2015

Hackers Exploit Stolen Firefox Bug Information

Mozilla is warning that at least one year ago, an attacker infiltrated the repository that it uses to log bugs pertaining to its Firefox browser, began stealing information relating to unpatched ...

Dangerous IE vulnerability opens door to powerful phishing attacks
5 Feb 2015

Dangerous IE vulnerability opens door to powerful phishing attacks

An Internet Explorer vulnerability lets attackers bypass the Same-Origin Policy, a fundamental browser security mechanism, to launch highly credible phishing attacks or hijack users’ accounts on any ...

CTB Locker and Critroni Ransomware Information Guide and FAQ
5 Feb 2015

CTB Locker and Critroni Ransomware Information Guide and FAQ

CTB Locker (Curve-Tor-Bitcoin Locker), otherwise known as Critroni, is a file-encrypting ransomware infection that was released in the middle of July 2014 that targets all versions of Windows ...

Ransomware: how to remove it, even when the computer does not boot?
16 Aug 2012

Ransomware: how to remove it, even when the computer does not boot?

Malware very often adds itself to the list of applications that start when operating system boots up. By doing so, it makes sure that when a user removes it during the system run, it will infect the ...

Flame’s code injection techniques
17 Aug 2012

Flame’s code injection techniques

Flame employs the most sophisticated system of code injections we’ve observed in malware. It distributes its elements throughout the OS processes using chains of up to three injections involving up ...

Anatomy of a Targeted Attack
17 Aug 2012

Anatomy of a Targeted Attack

We constantly deal with targeted attacks, and sometimes we are lucky enough to find the initial command and control mechanisms still live. On one malware response we found a piece of malware that was ...

Securing Your Web Browser
15 Apr 2011

Securing Your Web Browser

This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited ...