Akamai Diversity

Akamai Security Intelligence
& Threat Research

Tomer Shlomo

Tomer Shlomo

November 6, 2019 9:00 AM

Phishing detection via analytic networks

As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to create an efficient attack flow on their framework, from opening an email or clicking a link on a social media post, to visiting the phishing website, to completing the attack by sharing information,

Amanda Fakhreddine

Amanda Fakhreddine

October 30, 2019 5:00 AM

State of the Internet Security: Phishing - Baiting t ...

This Halloween, the scariest thing you might encounter could be lurking on the device you're reading this on.

Larry Cashdollar

Larry Cashdollar

October 21, 2019 8:00 AM

A Cryptomining SSH Worm

Recently, I noticed an interesting cryptomining script in my honeypot. It had all the usual checks for CPU and architecture type before downloading a binary. It even had the usual kill any processes that might be other cryptominers. However, what caught my eye was a one-line shell script that searched through .ssh/known_hosts and .ssh/id_pub.pub keys, in an attempt to infect other systems that might share SSH keys with the infected

Larry Cashdollar

Larry Cashdollar

October 7, 2019 8:00 AM

Drupalgeddon2 still used in attack campaigns

While examining Akamai's network attack logs, I noticed an attack campaign leveraging Drupalgeddon2. Drupalgeddon2 is an unauthenticated remote code execution vulnerability (CVE-2018-7600) in the Drupal CMS platform that was patched in March 2018.

Jonathan Respeto

Jonathan Respeto

September 18, 2019 8:00 AM

New DDoS Vector Observed in the Wild: WSD attacks hi ...

Additional research and support provided by Chad Seaman. Introduction Members of Akamai's Security Intelligence Response Team have been investigating a new DDoS vector that leverages a UDP Amplification technique known as WS-Discovery (WSD). The situation surrounding WSD was recently made public, but multiple threat actors have begun to leverage this DDoS method to ramp up their attacks. While conducting exploratory research prior to WSD becoming public, the Akamai SIRT gained

Amanda Fakhreddine

Amanda Fakhreddine

September 12, 2019 5:00 AM

State of The Internet / Security: Media Under Attack ...

From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. Today, we're releasing a special edition of the State of the Internet/ Security report that focuses on data within the high tech, video media, and entertainment sectors -- collectively named Media & Technology.

Larry Cashdollar

Larry Cashdollar

August 30, 2019 5:30 PM

XMR Cryptomining Targeting x86/i686 Systems

I have been playing close attention to Internet of Things (IoT) malware targeting systems with Telnet enabled, while also collecting samples targeting systems with SSH enabled on port 22. I've collected over 650 samples landing in my honeypot within the last week. The earliest sample showed up on July 24th at 20:06. The honeypot allows logins using known default login credentials for root.

Akamai

Akamai

August 13, 2019 12:14 PM

HTTP2 Vulnerabilities

On Tuesday, August 13th at 10 AM Pacific Time (1700UTC), Netflix publicly disclosed a series of vulnerabilities found by Jonathan Looney that impact many implementations of the HTTP2 protocol. A vulnerability found by Piotr Sikora of Google was also released at the same time. Akamai is grateful to the reporters for their work and pre-release coordination.

Or Katz

Or Katz

August 5, 2019 6:16 AM

Summer Phishing Scams Targeting Vacation Hotspots

As phishing websites become more advanced, by using rich functionality and customized workflows, evidence indicates that web analytics plugins are being commonly used in phishing kits. This enables threat actors to have stronger visibility into victim profiles and their behavior once they have landed on the scam website. This, in turn, can lead to future optimizations of the phishing kit and scam's distribution.