Akamai Diversity

Akamai Security Intelligence & Threat Research

Larry Cashdollar

Larry Cashdollar

June 13, 2019 11:17 AM

Latest ECHOBOT: 26 Infection Vectors

Introduction Since the release of the Mirai source code in October of 2016, there have been hundreds of variants. While publishing my own research, I noticed that Palo Alto Networks was also examining similar samples, and published their findings. Earlier this month, not too long after Palo Alto Networks published their report, I discovered a newer version of Echobot that uses 26 different exploits for its infection vectors. In some

Larry Cashdollar

Larry Cashdollar

June 5, 2019 8:00 AM

Identifying Vulnerabilities in Phishing Kits

While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting - several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the impact phishing kits have on the Internet and web hosting as a whole, the phrase "kicking someone when they're down" certainly come to mind.

Amiram Cohen

Amiram Cohen

May 21, 2019 8:00 AM

16Shop: Commercial Phishing Kit Has A Hidden Backdoo ...

Additional research by Or Katz When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is sold to criminals looking to collect sensitive information from a targeted subset of the Internet community, at least one pirated version circulating online houses a backdoor that siphons off the data harvested and delivers it

Threat Research Team

Threat Research Team

May 15, 2019 8:00 AM

Bots Tampering with TLS to Avoid Detection

Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are randomizing SSL/TLS signatures in an attempt to evade detection attempts.

Yael Daihes

Yael Daihes

April 10, 2019 8:00 AM

Does DNS Data Really Matter?

Real-world data on how adding DNS data to a deep learning model increases its effectiveness By Yael Daihes & Craig Sprosts These days, big data and machine learning are topics of frequent discussion within the security community. While the idea that machine learning algorithms prosper with access to more data is hardly a revelation, we wanted to dig deeper and conduct an experiment using global DNS traffic. More specifically, how

Larry Cashdollar

Larry Cashdollar

April 1, 2019 10:09 AM

SIRT Advisory: Multiple Vulnerabilities in Magento

Summary Magento users should patch their systems to the fixed versions 2.3.1, 2.2.8 and 2.1.17 immediately due to multiple severe vulnerabilities disclosed in Magento on March 26, 2019.

Jonathan Respeto

Jonathan Respeto

March 20, 2019 7:00 AM

Continuous Training with CTF's

Akamai Engineering Culture Akamai is an environment fueled by the desire to learn and improve. There are open engineering and training courses, wikis, live training sessions, as well as engineer lead lecture series. Most importantly there is a strong culture around continued personal and professional development. The Security Operations Control Center (SOCC), for example, has a continuous training program where team members are given a full day, every week, dedicated

Larry Cashdollar

Larry Cashdollar

February 5, 2019 1:58 PM

Phishing Attacks Against Facebook / Google via Googl ...

When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally. This is an interesting attack, as it uses Google Translate, and targets multiple accounts in one go.

Akamai InfoSec

Akamai InfoSec

January 22, 2019 9:00 AM

InfoSec experiment - Letting the CAT out of the bag

By Lukasz Orzechowski If you work on an Information Security team that gets customer questionnaires, you're likely familiar with Vendor Security Risk Assessment templates. We all care about information safety, and it is natural for our customers to want to check how well we are aligned with what they require internally, or with industry standards. We get a lot of questions and addressing them is our bread and butter. One