Akamai Diversity

Akamai Security Intelligence & Threat Research

June 2017 Archives

Martin McKeay

Martin McKeay

June 27, 2017 2:28 PM

Dealing with Petya

Akamai is aware of and is tracking the malware threat known as "Petya". Petya is ransomware spread using several methods, including PSexec, Windows Management Instrumentation Command-line (WMIC), and the EternalBlue exploit used by the WannaCry family of ransomware. The malware spreads via port 139 and 445; it probes IP addresses on the local subnet for vulnerable systems.

Hongliang Liu

Hongliang Liu

June 6, 2017 3:36 PM

Reclaiming the hijacked browser

OverviewA browser hijacker is the type of malware which alters your device's browser settings so that you are redirected to web sites that you had no intention of visiting. It is an old, and yet very prevalent problem today.

AkamAI Research

AkamAI Research

June 5, 2017 12:12 PM

Passive HTTP2 Client Fingerprinting - White Paper

HTTP2 is the second major version of the HTTP protocol. It changes the way HTTP is transferred "on the wire" by introducing a full binary protocol, made up of TCP connections, streams and frames, rather than simply being a plain-text protocol. Such a fundamental change between HTTP/1.x to HTTP/2, meant that client side and server side implementations had to incorporate completely new code to support new HTTP2 features - this

Yohai Einav

Yohai Einav

June 1, 2017 2:54 PM

Hoffmeister.br Amplification Attacker: Sparks Inside ...

Looking at the hoffmeister.be data (yes, our previously identified attacker fixed a typo in the TLD) and recent attempts at large-scale amplification attacks, I noticed a surprising absence of spoofed source addresses. My first thought was that the ISP forces the correct IP onto packets entering the network, but that is not common practice (illegal source address packets are dropped if you implement BCP38, SAVI and/or unicast RPF).