Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Lightboard Lessons: What is DDoS?

Over the last quarter, there were approximately 500 DDoS attacks daily around the world with some lasting as long as 300 hours. In this Lightboard Lesson I light up some #basics about DoS and DDoS attacks.   ps Related: DDoS attacks in Q2... Read more
0 Reviews

Lightboard Lessons: What are Bots?

In this Lightboard Lesson, I light up some #basics about internet bots and botnets. Humans account for less than 50% of internet traffic and the rest is spread between the good bots and bad ones. ps Related: The Facts about Botnets The state of... Read more
2 Reviews

Encrypted malware vs. F5's full proxy architecture

Everyone knows that malware is a huge problem, and several recent studies have shown that nearly half of all malware is now encrypted. How do you go about finding it and stopping it if you can't even read it? Read more
1 Review

Achtung! TrickBot!

TrickBot does not rest. Following the recent addition of its first targeted US-based bank, a new version of the malware has been spotted in the wild. Now in its 11th incarnation, TrickBot has expanded its ever growing target portfolio yet again –... Read more
1 Review

TrickBot targets its first US bank

The latest arrival to the banking malware scene, and successor to the infamous Dyre Trojan continues to evolve. TrickBot previously targeted banks and businesses in Australia, New Zealand, Germany, UK, Ireland, Canada, India and Singapore. In a... Read more
1 Review

Is "Xmaker" the new “TrickLoader”?

Overview During November of 2015, the Dyre banking Trojan, which was very prolific at the time and targeted countless financial institutions worldwide, vanished from the wild almost overnight. It was only during February of 2016 that the... Read more
2 Reviews

Lock Down Your Login

Last week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. This time we’re... Read more
1 Review

Webinject Crafting Goes Professional: Gozi sharing Tinba webinjects

Researched and co-authored by the F5 SOC and the F5 Security Research team Webinject crafting is a separate profession now. There are people who write webinjects and sell them to fraudsters, who use them to weaponize Trojans. Based on our... Read more
2 Reviews

The Dangerous Game of DNS

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more
2 Reviews

Dridex Malware – New Week, New Targets

Our ongoing campaign analysis has revealed that Dridex malware’s latest campaign focus has strongly shifted in recent months from U.K. banks, which had been the main targets previously, to US banks today. Dridex and its latest trends are... Read more
1 Review

Gootkit Malware, New Targets around the World

During the last campaign of Gootkit malware, detected by F5 in February 2016, new targets were spotted while analyzing its configuration. Gootkit, identified in some cases as Waldek, is a banking Trojan that was first seen in the wild around... Read more
2 Reviews

Tinbapore: Millions of Dollars at Risk

Detected by F5 WebSafe security solutions during November 2015, Tinbapore attack has put millions of US dollars at risk. F5 Security experts investigation revealed that Tinbapore is actually a new variant of the good old Tinba Malware that so far... Read more
1 Review

Yasuo-Bot–the flexible mobile banker targeting Russia and East-Europe

Mobile financial malware needs little introduction, since 2010 mobile malware is on the rise. The first mobile Trojan launched was ‘Zitmo’ (Zeus-In-The-Mobile. A Mobile version of the most common PC Trojan – ZeuS) which was then followed by many... Read more
Average Rating: 4.9
3 Reviews

Dyre - No Rest for the Wicked

Dyre malware requires little introduction as it had been the focus of many publications and it is a well-known threat in the financial malware world. One of the reasons for it being so infamous is the frequent changes the authors incorporate in... Read more
Average Rating: 4.5
6 Reviews

Domain name holders hit with personalized, malware-laden suspension notices

This according to Zeljka Zorz, HNS Managing Editor from Help Net Security. In his article, Zeljka mention that new email spam campaign has been spotted targeting domain name holders, trying to trick them into downloading malware on their systems.... Read more
1 Review

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two... Read more
1 Review

Slave – IBAN swap, persistency and Zeus-style webinject

Slave is a financial malware written in visual basic. It was first seen around March 2015 and has undergone a significant evolution. Slave conducts its attack by hooking the Internet browser functions and manipulating their code for various... Read more
0 Reviews

VBKlip Banking Trojan Goes Man-In-The-Browser

VBKlip Banking Trojan Goes Man-In-The-Browser   VBKlip malware was first introduced by Cert Polska back in 2013. It started out as a simple yet effective threat, targeting Polish on-line banking users. Its first reincarnation intercepted... Read more
Average Rating: 4.9
4 Reviews

Security Pinterest 2014

I would have put this in the "1024 Words" category, but I think I might have went over budget on the words. Enjoy! Read more
0 Reviews

Tinba Malware – New, Improved, Persistent

As investigated by Pavel Asinovsky, F5 SOC Malware Researcher, Tinba, also known as “Tinybanker”, “Zusy” and “HµNT€R$”, is a banking Trojan that was first seen in the wild around May 2012. Its source code was leaked in July 2014.... Read more
Average Rating: 4.9
3 Reviews

Security Sidebar: Political Activism Laced With Malware

Civil disobedience invokes personal emotions and actions that are rivaled by few things.  For thousands of years, there has been a natural tension between a government and its people.  When, in some people's minds, the government steps too... Read more
1 Review

F5 SOC Malware Summary Report: Neverquest

#F5SOC #malware #2FA #infosec The good news is that compromising #2FA requires twice the work. The bad news? Malware can do it. That malware is a serious problem, particularly for organizations that deal with money, is no surprise. Malware is one... Read more
1 Review

Fear and Loathing ID Theft

Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the... Read more
0 Reviews

Malware costs $491 Billion in Perspective

A recent joint study from IDC and the National University of Singapore (NUS) predicts that companies around the globe will spend around $491 billion in 2014 for fixes and recovery from data breaches and malware. The sponsor, Microsoft, also noted... Read more
0 Reviews

Mobile Malware Milestone

Did you celebrate or castigate? You might not know but last week was the 10 year birthday of Cabir, the first mobile malware. It spread through Bluetooth after infecting the Nokia Series 60 phones running Symbian. Also last week, Kindsight... Read more
0 Reviews