Akamai Diversity

Akamai Security Intelligence
& Threat Research

Or Katz

Or Katz

April 28, 2020 8:00 AM

Brazil Targeted by Phishing Scam Harnessing COVID-19 ...

Researchers at Akamai have identified a new phishing campaign targeting users in Brazil who are worried about their finances during the COVID-19 epidemic. Over two weeks, we identified that the three-question quiz campaign successfully targeted more than 850,000 victims, scamming them out of personal information, and in some cases, convincing them to install Adware on their computer.

Elisa Gangemi

Elisa Gangemi

April 21, 2020 9:46 AM

Research Failures Aren't Failings

I'm going to tell you a story. It's not a common story about research successes. This story is about a research project where I failed to find answers to questions, and why that's okay. Starting off, my research partner and I knew the project was a big ask, based on the open-ended question of whether there was a cause for the jump in SQL Injection (SQLi) attacks over the last

Larry Cashdollar

Larry Cashdollar

April 15, 2020 8:00 AM

A Brief History of a Rootable Docker Image

I've been working with many different honeypot implementations lately - from cowrie and WordPot, to Dionaea and WAPot. To expand on that, I decided to set up a simple docker image with SSH, running a guessable root password. The catch? I'd be capturing all the credentials used to login to the docker image, as well as the entire shell session, to a log file and the screen. The attacker wouldn't

Martin McKeay

Martin McKeay

April 13, 2020 8:00 AM

The Building Wave of Internet Traffic

The Novel Coronavirus, and the resulting viral respiratory illness caused by it, COVID-19, is changing our world. As much as possible, people around the world are practicing social distancing. This means working remotely for a large number of people, possibly for the first time in their lives. From Akamai's view, these changes led to a 30% growth in Internet traffic in March, causing many people to ask if the Web

Or Katz

Or Katz

April 2, 2020 8:00 AM

Threat Actors Recycling Phishing Kits in New Coronav ...

Recently, researchers at Akamai observed phishing attacks leveraging recycled kits in a series of campaigns taking advantage of the Coronavirus (COVID-19) health crisis. Phishing kits that have been previously deployed over the last several months are now being used again in order to reach a new pool of potential victims: those working from home due to self-isolation, mandated quarantine, or corporate policy during the pandemic.

Or Katz

Or Katz

March 10, 2020 8:00 AM

Phishing Victims From a CDN's Point of View

Overview Being a Content Delivery Network (CDN) platform, sometimes you can see fractions of attacks on the wire. In this blog, we will focus on phishing websites that, while not being delivered by the Akamai platform, are referring to or redirecting victims to pages that are on Akamai's platform.

Danny Stern

Danny Stern

February 25, 2020 9:00 AM

How I Avoided A Recruiter Scam

Recruitment scams are a serious, but often overlooked risk to job seekers. Those responsible for these schemes often play on the victim's stress levels or professional ego, by using authority to offer something that could be life changing, often with large salaries. I've personally experienced a recruitment scam. In this post, we'll explore the scam that targeted me, and the steps I took that prevented me from becoming a victim.

Amanda Fakhreddine

Amanda Fakhreddine

February 19, 2020 6:00 AM

State of the Internet / Security Volume 6, Issue 1

Happy New Year! It's February now, so we've made, and most likely have broken, all of those New Year's Resolutions that we vowed to keep. As we look forward to the rest of 2020, the staff that produces the State of the Internet / Security report really only has one resolution -- evolve.

Daniel Abeles

Daniel Abeles

January 20, 2020 9:00 AM

Abusing the Service Workers API

The Service Worker web API is a powerful new API for web browsers. During our research, we have found several ways attackers can leverage this API to enhance their low-to-medium risk findings into a powerful and meaningful attack. By abusing this API, an attacker can also leave his footprint in the victim's browser and potentially leak sensitive information. By the end of this post, you will have the basics