Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

29 June 2015

I'm all about the tech, about the tech, no bubble

By Christian Toon Follow @christiantoon I'm all about the tech, about the tech, no bubble. As we edge closer into this digital world the speed in which technology is evolving to change our physical and intellectual world is fast, there's no denying this. In the last 12 months alone, we've...

24 June 2015

UnFIN4ished Business

By Michael Yip and Chris Doman Follow @michael_yip Follow @chrisdoman Overview With access to business critical information, senior executives and consultants are often said to be valuable targets for threat actors tasked with obtaining sensitive business secrets. FIN4 is a financially motivated threat actor which has consistently targeted this population....

05 June 2015

Neutrino Exploit Kit delivers zero-detection Zeus Variant

By Stephen Ramage Follow @SFRamage We recently spotted Neutrino being used to deliver a zero-detection Zeus variant and are sharing some brief indicators here. The Neutrino Exploit Kit check-in response contains base64 encoded data within HTML comment tags: Decoded, this translates to: 1401076386715766#rate 5#1433384183216305#loader http[:]//sells-store[.]com/forum/acez.exe# Retrieving that executable, which...

02 June 2015

Information security breaches survey: the results are in

By Andrew Miller and Andrew Colloby We have been commissioned by the Department for Business, Innovation and Skills (BIS) to survey companies across the UK on cyber security incidents and emerging trends. This survey aimed to provide greater awareness amongst UK business of the risks, insights on how companies are...

29 May 2015

Diamonds or chains

By Rob MacGregor You’re setting up a new team to deal with targeted cyber attacks and your boss has asked you whether you should be using the Diamond Model or the Cyber Kill Chain®. Thinking furiously for a moment, you pick one and feel relieved as they wander off, only...

27 May 2015

Hunting the network snark

By Rob MacGregor Using entropy to help in hunting anomalies on a network is an approach that has been around for at least the last ten years or so. The trouble is that, by itself, knowing that a certain network flow has an entropy of 7.5 doesn’t help you. It...

18 May 2015

Cyber security and risk: refresh your perspective with four key steps

By Gregory Liebergen Follow @gregliebergen Internal weaknesses are as dangerous as external hackers when it comes to cyber threats. External threats regularly grab the media headlines. These malicious threats cause real damage (on average, £3.98 million per incident for organisations with annual revenues of £676 million) as demonstrated last year...

30 April 2015

A new Internet tipping point - consumers getting more power… and responsibility

By Richard Mardling Follow @rmardling I’ve recently come of age in the world of the Internet, it’s 21 years since I first signed up for my Demon Internet account. Using a modem at speeds we wouldn’t recognise these days, I was just grateful to get online! The ability to email...

27 April 2015

Attacks against Israeli & Palestinian interests

By Tom Lancaster Follow @tlansec Executive Summary This short report details the techniques being used in a series of attacks mostly against Israel-based organisations. The decoy documents and filenames used in the attacks suggest the intended targets include organisations with political interests or influence in Israel and Palestine. Although we...

20 April 2015

The Sofacy plot thickens

By Tom Lancaster and Chris Doman Follow @tlansec Follow @chrisdoman Background There has been some recent news regarding further activities of a group variously described as Sofacy[1]. We are releasing this flash bulletin containing network indicators to aid security professionals in detecting this activity. Please contact us on threatintelligence@uk.pwc.com and...