<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>	<title>Akamai Security Intelligence and Threat Research Blog</title>
	<link>https://www.akamai.com/blog</link>
	<description>Akamai Security Intelligence and Threat Research Blog</description>
	<language>en</language>
	<copyright>Akamai Technologies</copyright>
<item>
	<title>Anatomy of a SYN-ACK Attack</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/anatomy-of-a-syn-ack-attack</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/anatomy-of-a-syn-ack-attack</guid>
	<pubDate>Tue, 01 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>TCP Middlebox Reflection: Coming to a DDoS Near You</title>
	<description>Over the past week, Akamai Security Researchers have detected and analyzed a series of TCP reflection attacks, peaking at 11 Gbps at 1.5 Mpps, that were leveled against Akamai customers. The attack, amplified with a technique called TCP Middlebox Reflection, abuses vulnerable firewalls and content filtering systems to reflect and amplify TCP traffic to a victim machine, creating a powerful DDoS attack. </description>
	<link>https://www.akamai.com/blog/security/tcp-middlebox-reflection</link>
	<author>Security Intelligence Response Team</author>
	<guid>https://www.akamai.com/blog/security/tcp-middlebox-reflection</guid>
	<pubDate>Tue, 01 Mar 2022 13:38:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Reports Another DoS in Log4j2 (CVE-2021-45105): What You Need to Know</title>
	<description>The series of vulnerabilities recently discovered in Log4j2 has shocked the internet. As part of our continuing research, on December 17, Hideki Okamoto from Akamai found and responsibly reported an additional denial-of-service (DoS) vulnerability, which was assigned as CVE-2021-45105.</description>
	<link>https://www.akamai.com/blog/security/akamai-reports-another-dos-inlog4j2</link>
	<author>Akamai Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/akamai-reports-another-dos-inlog4j2</guid>
	<pubDate>Mon, 20 Dec 2021 18:30:57 UTC</pubDate>

</item>
<item>
	<title>Capoae Malware Ramps Up: Uses Multiple Vulnerabilities and Tactics to Spread</title>
	<description>Recently, there has been a plethora of UPX packed crypto-mining malware written in Golang targeting Linux systems and web applications popping up in the news. The malware’s primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they’ve been infected, these systems are then used to mine cryptocurrency.  I’ve named the sample I examined for this post ‘Capoae,’ based on the code’s output to my terminal. </description>
	<link>https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread</guid>
	<pubDate>Thu, 16 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Kinsing evolves, adds Windows to attack list</title>
	<description>The campaign was first seen by the Akamai SIRT on February 16, 2021, and appears to be targeting both Windows and Linux systems. The botnet caught our interest because it has shown to be highly active across a diverse set of geographical regions, including the Americas, Europe, and Asia. </description>
	<link>https://www.akamai.com/blog/security/kinsing-evolves-adds-windows-to-attack-list</link>
	<author>Evyatar Saias</author>
	<guid>https://www.akamai.com/blog/security/kinsing-evolves-adds-windows-to-attack-list</guid>
	<pubDate>Thu, 16 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>UPX Packed Headaches</title>
	<description>Researching malware has many challenges.  One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we've written a small tool in C that could fix intentionally corrupted binaries automatically. We also plan to open-source the project so other researchers could use it too, and perhaps improve and expand upon the tool's capabilities as needed.</description>
	<link>https://www.akamai.com/blog/security/upx-packed-headaches</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/upx-packed-headaches</guid>
	<pubDate>Mon, 23 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>HTTP/2 Request Smuggling</title>
	<description>HTTP Request Smuggling (also known as an HTTP Desync Attack) has experienced a resurgence in security research recently, thanks in large part to the outstanding work by security researcher James Kettle. His 2019 Blackhat presentation on HTTP Desync attacks exposed vulnerabilities with different implementations of the HTTP Standards, particularly within proxy servers and Content Delivery Networks (CDNs).These implementation differences with regard to how proxy servers interpret the construction of web requests have led to new request smuggling vulnerabilities. (Direct link to information on new vulnerability).</description>
	<link>https://www.akamai.com/blog/security/http-2-request-smuggling</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/http-2-request-smuggling</guid>
	<pubDate>Thu, 05 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Kaseya Supply Chain Ransomware Attack</title>
	<description>On July 2, 2021, Kaseya disclosed an active attack against customers using its VSA product, and urged all on-premise customers to switch-off Kaseya VSA. Shortly before this alert, users on Reddit started describing ransomware incidents against managed security providers (MSPs), and the common thread among them was on-premise VSA deployments. In the hours to follow, several indicators of compromise (IOCs) were released, and Akamai was able to observe some of that traffic. A patch for the VSA product was released by Kaseya on July 11.
</description>
	<link>https://www.akamai.com/blog/security/kaseya-supply-chain-ransomware-attack</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/kaseya-supply-chain-ransomware-attack</guid>
	<pubDate>Thu, 15 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>NorthSec CTF 2021 Write Up: 'Impurity Assessment Form'</title>
	<description>This is a write up of a NorthSec 2021 CTF problem I solved with Allan Wirth (@Allan_Wirth) as part of team SaaS which finished in 3rd. It was an extremely creative problem to solve so I wanted to share it here. </description>
	<link>https://www.akamai.com/blog/security/northsec-ctf-2021-write-up-impurity-assessment-form</link>
	<author>Samuel Erb</author>
	<guid>https://www.akamai.com/blog/security/northsec-ctf-2021-write-up-impurity-assessment-form</guid>
	<pubDate>Tue, 22 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>What A Funny App I Got Here!</title>
	<description>When you hear the word "malware",  the first thing that might come to your mind is a PC or laptop. You think about some weird advertising pop-ups or unrecognized processes running in the background.
</description>
	<link>https://www.akamai.com/blog/security/what-a-funny-app-i-got-here</link>
	<author>Aleksandra Blaszczyk </author>
	<guid>https://www.akamai.com/blog/security/what-a-funny-app-i-got-here</guid>
	<pubDate>Mon, 21 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>ThinkPHP Exploit Actively Exploited in the Wild</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/thinkphp-exploit-actively-exploited-in-the-wild</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/thinkphp-exploit-actively-exploited-in-the-wild</guid>
	<pubDate>Wed, 26 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Romanian Crypto Mining Infection</title>
	<description>While examining my honeypot logs and digging through the newly downloaded binaries last week, I noticed a large compressed file. I figured it would be a crypto miner, typically a tar archive and gzip (normally erroneously) compressed. I moved the archive over to my test lab and started examining the contents.
</description>
	<link>https://www.akamai.com/blog/security/romanian-crypto-mining-infection</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/romanian-crypto-mining-infection</guid>
	<pubDate>Mon, 24 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Partnering With Verizon on the 2021 DBIR</title>
	<description>By the time you read this post, the 2021 Verizon Data Breach Investigation Report (DBIR) will be published. Akamai has been one of the many partners contributing data to this report for more than half a decade. We greatly value the time, effort, and dedicated data science that goes into providing this level of research to the security community.  
</description>
	<link>https://www.akamai.com/blog/security/partnering-with-verizon-on-the-2021-dbir</link>
	<author>Martin McKeay</author>
	<guid>https://www.akamai.com/blog/security/partnering-with-verizon-on-the-2021-dbir</guid>
	<pubDate>Thu, 13 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Two Years of Tax Phishing - The Oldest Scam in the Book</title>
	<description>Tax scams are some of the oldest scams in a criminal's book, and they're highly attractive to criminals for many reasons. </description>
	<link>https://www.akamai.com/blog/security/two-years-of-tax-phishing-the-oldest-scam-in-the-book</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/two-years-of-tax-phishing-the-oldest-scam-in-the-book</guid>
	<pubDate>Wed, 05 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Tax Season: Criminals Play the Numbers Game Too</title>
	<description>Criminals love tax season. The stress and urgency surrounding this time of year makes the victim pool highly vulnerable to various types of schemes.</description>
	<link>https://www.akamai.com/blog/security/tax-season-criminals-play-the-numbers-game-too</link>
	<author>Steve Ragan</author>
	<guid>https://www.akamai.com/blog/security/tax-season-criminals-play-the-numbers-game-too</guid>
	<pubDate>Tue, 06 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2020-15915 -- Quest for KACE blind SQLi</title>
	<description>At Akamai, the Enterprise Security Red Team (ESRT) continuously strives to evaluate the security of both our external and internal services. </description>
	<link>https://www.akamai.com/blog/security/cve-2020-15915-quest-for-kace-blind-sqli</link>
	<author>Samuel Erb</author>
	<guid>https://www.akamai.com/blog/security/cve-2020-15915-quest-for-kace-blind-sqli</guid>
	<pubDate>Fri, 26 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Threat Advisory - DCCP for (D)DoS</title>
	<description>Recent attacks against Akamai customers have leveraged a networking protocol known as protocol 33, or Datagram Congestion Control Protocol (DCCP).  </description>
	<link>https://www.akamai.com/blog/security/threat-advisory-dccp-for-ddos</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/threat-advisory-dccp-for-ddos</guid>
	<pubDate>Tue, 23 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Another Golang Crypto Miner On the Loose</title>
	<description>There are many crypto mining malware variants infecting systems on the internet. On Friday, March 4, 2021, I noticed an interesting hit in my honeypot logs.  The binary it captured stood out, as it was rather large at 4MB.  I immediately thought it would be a crypto miner written in the Go language. I was correct. This one however, has some newer exploits it's using for proliferation.</description>
	<link>https://www.akamai.com/blog/security/another-golang-crypto-miner-on-the-loose</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/another-golang-crypto-miner-on-the-loose</guid>
	<pubDate>Tue, 16 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Now Launching - SOTI: Research</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/now-launching-soti-research</link>
	<author>Amanda Goedde</author>
	<guid>https://www.akamai.com/blog/security/now-launching-soti-research</guid>
	<pubDate>Wed, 10 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Sensor Architecture Can Help Keep Us Up and Running: Part 2</title>
	<description>Previously, I introduced the field of sensor systems architecture and posed a real world example scenario of the unnecessary resource costs and hazards that can happen when the deployment of sensors isn't carefully thought out. </description>
	<link>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-2</link>
	<author>Kristin Nelson-Patel</author>
	<guid>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-2</guid>
	<pubDate>Tue, 09 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Sensor Architecture Can Help Keep Us Up and Running: Part 1</title>
	<description>In the constant press of rolling out ever better products and services to our customers, it can be easy-- and often necessary-- to fall into a reactive mode around reliability.</description>
	<link>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-1</link>
	<author>Kristin Nelson-Patel</author>
	<guid>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-1</guid>
	<pubDate>Thu, 04 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Better, or More Effective?</title>
	<description>A colleague asked me to share my thoughts on building a "better team". I confess, I stumbled on the word "better". Better than what exactly? </description>
	<link>https://www.akamai.com/blog/security/better-or-more-effective</link>
	<author>Fadi Saba</author>
	<guid>https://www.akamai.com/blog/security/better-or-more-effective</guid>
	<pubDate>Mon, 01 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title> Optimizing For Performance, One Hire at a Time: Part 3</title>
	<description>Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills.</description>
	<link>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-3</link>
	<author>Kathryn Kun</author>
	<guid>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-3</guid>
	<pubDate>Thu, 25 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Bitcoins, Blockchains, and Botnets</title>
	<description>A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts.</description>
	<link>https://www.akamai.com/blog/security/bitcoins--blockchains--and-botnets</link>
	<author>Evyatar Saias</author>
	<guid>https://www.akamai.com/blog/security/bitcoins--blockchains--and-botnets</guid>
	<pubDate>Tue, 23 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Out of My Depth (Where I Belong)</title>
	<description>I remember well my first day as a member of Akamai's InfoSec department.

The Friday prior, I'd just completed the Akamai Technical Academy, a five-month crash-course in all things tech, and was now, on a cold but sunny Monday morning, joining InfoSec for their weekly staff meeting.  Eager to make a good first impression, I took a seat at the large, crowded conference table, opened my notebook, and started to take notes.</description>
	<link>https://www.akamai.com/blog/security/out-of-my-depth-where-i-belong</link>
	<author>Guest Blogger</author>
	<guid>https://www.akamai.com/blog/security/out-of-my-depth-where-i-belong</guid>
	<pubDate>Fri, 19 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Massive Campaign Targeting UK Banks Bypassing 2FA</title>
	<description>On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). </description>
	<link>https://www.akamai.com/blog/security/massive-campaign-targeting-uk-banks-bypassing-2fa</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/massive-campaign-targeting-uk-banks-bypassing-2fa</guid>
	<pubDate>Thu, 18 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>NHS Vaccine Scams: Criminals Still Targeting COVID-19 Anxiety</title>
	<description>It's 2021, but the anxiety, fear, uncertainty, and stress caused by the COVID-19 pandemic in 2020 is very much alive today.</description>
	<link>https://www.akamai.com/blog/security/nhs-vaccine-scams-criminals-still-targeting-covid-19-anxiety</link>
	<author>Steve Ragan</author>
	<guid>https://www.akamai.com/blog/security/nhs-vaccine-scams-criminals-still-targeting-covid-19-anxiety</guid>
	<pubDate>Thu, 11 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Optimizing for Performance, One Hire at a Time: Part 1</title>
	<description>It's a lot of fun to imagine and design the best team.  As managers, it's rare that we get to build a team from the ground up and all at once. </description>
	<link>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-1</link>
	<author>Kathryn Kun</author>
	<guid>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-1</guid>
	<pubDate>Wed, 10 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Command Injection on a D-Link Router</title>
	<description>During the COVID-19 pandemic, I wanted to extend the local WiFi in my home to reach all the floors. The goal was to have full connectivity from every location in the house.</description>
	<link>https://www.akamai.com/blog/security/command-injection-on-a-d-link-router</link>
	<author>Assaf Vilmovski</author>
	<guid>https://www.akamai.com/blog/security/command-injection-on-a-d-link-router</guid>
	<pubDate>Tue, 09 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>When Destiny is Knocking on Your Door Again - Data Mining CDN Logs to Refine and Optimize Web Attack Detection</title>
	<description>A few years ago, I wrote a blog post trying to explain, with humor, why choosing application security as a career path is destiny derived by my parents calling me "Or", and why a personal name that is a conditional word can sometimes be challenging in daily routines, since some attack payloads contain conditional words.</description>
	<link>https://www.akamai.com/blog/security/when-destiny-is-knocking-on-your-door-again-data-mining-cdn-logs</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/when-destiny-is-knocking-on-your-door-again-data-mining-cdn-logs</guid>
	<pubDate>Wed, 27 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Minecraft Players are Targets Even Off the Network</title>
	<description>When we write the SOTI and talk about attacks against gamers, we spend a good deal of time focusing on network-level events, such as DDoS and credential stuffing.</description>
	<link>https://www.akamai.com/blog/security/minecraft-players-are-targets-even-off-the-network</link>
	<author>Steve Ragan</author>
	<guid>https://www.akamai.com/blog/security/minecraft-players-are-targets-even-off-the-network</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>What happens when your vulnerability is weaponized for botnet proliferation</title>
	<description>This post will focus on the weaponization of a few of the exploits only, as Sarit and Ofir documented everything else.</description>
	<link>https://www.akamai.com/blog/security/what-happens-when-your-vulnerability-is-weaponized-for-botnet-proliferation</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/what-happens-when-your-vulnerability-is-weaponized-for-botnet-proliferation</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Evading Link Scanning Security Services with Passive Fingerprinting</title>
	<description>By Gal Bitensky, Executive Summary Link scanners are a critical component in multiple classes of security products including email security suites, websites that suggest direct inspection of a suspicious link, and others. Behind the scenes, these services use web clients...</description>
	<link>https://www.akamai.com/blog/security/evading-link-scanning-security-services-with-passive-fingerprinting</link>
	<author>Gal Bitensky</author>
	<guid>https://www.akamai.com/blog/security/evading-link-scanning-security-services-with-passive-fingerprinting</guid>
	<pubDate>Wed, 09 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Summary 2020—Trends and Highlights</title>
	<description>2020 was a challenging year for many of us, as the COVID-19 pandemic disrupted life and introduced challenges in almost all elements of living. 2020 was also challenging from a cybersecurity point of view, as nearly the entire workforce moved...</description>
	<link>https://www.akamai.com/blog/security/phishing-summary-2020-trends-and-highlights</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/phishing-summary-2020-trends-and-highlights</guid>
	<pubDate>Tue, 08 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>WordPress Malware Setting Up SEO Shops</title>
	<description>While recently looking over my honeypots, I discovered an infection where a malicious actor added a storefront on top of my existing WordPress installation. For background, this particular honeypot is a full instance of WordPress running on a Docker image....</description>
	<link>https://www.akamai.com/blog/security/wordpress-malware-setting-up-seo-shops</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/wordpress-malware-setting-up-seo-shops</guid>
	<pubDate>Fri, 20 Nov 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Catch Me if You Can—JavaScript Obfuscation</title>
	<description>While conducting threat research on phishing evasion techniques, Akamai came across threat actors using obfuscation and encryption, making the malicious page harder to detect. The criminals were using JavaScript to pull this off....</description>
	<link>https://www.akamai.com/blog/security/catch-me-if-you-can-javascript-obfuscation</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/catch-me-if-you-can-javascript-obfuscation</guid>
	<pubDate>Mon, 26 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Extortion Examination</title>
	<description>In terms of the Distributed Denial of Service (DDoS) landscape, 2020 was almost boring prior to the beginning of August. The excitement from the record peak Gbps and Mpps seen in early summer had worn off, and we weren't seeing...</description>
	<link>https://www.akamai.com/blog/security/ddos-extortion-examination</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/ddos-extortion-examination</guid>
	<pubDate>Fri, 16 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Ransom Demands Return: New DDoS Extortion Threats From Old Actors Targeting Finance and Retail</title>
	<description>Update 08/24/2020 As mentioned below, the Akamai SIRT has been tracking attacks from the so-called Armada Collective and Fancy Bear actors, who are sending ransom letters to various industry verticals such as finance, travel, and e-commerce. In addition to the...</description>
	<link>https://www.akamai.com/blog/security/ransom-demands-return-new-ddos-extortion-threats-from-old-actors-targeting-finance-and-retail</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/ransom-demands-return-new-ddos-extortion-threats-from-old-actors-targeting-finance-and-retail</guid>
	<pubDate>Mon, 17 Aug 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Stealthworker: Golang-based Brute Force Malware Still an Active Threat</title>
	<description>By: Larry Cashdollar Malware that can target Windows and Linux systems was recently installed on my honeypot. After some investigation, I determined it to be similar to the malware discovered in February of 2019 by Malwarebytes, and later examined by...</description>
	<link>https://www.akamai.com/blog/security/stealthworker-golang-based-brute-force-malware-still-an-active-threat</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/stealthworker-golang-based-brute-force-malware-still-an-active-threat</guid>
	<pubDate>Wed, 03 Jun 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Watch Your Step: The Prevalence of IDN Homograph Attacks</title>
	<description>The internationalized domain name (IDN) homograph attack is used to form domain names that visually resemble legitimate domain names, albeit, using a different set of characters [1]. For example, the IDN </description>
	<link>https://www.akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks</link>
	<author>Asaf Nadler</author>
	<guid>https://www.akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks</guid>
	<pubDate>Wed, 27 May 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Parts of a Whole: Effect of COVID-19 on US Internet Traffic</title>
	<description>Introduction In our previous post, The Building Wave of Internet Traffic, we looked at the traffic patterns across Europe and the effect the COVID-19 pandemic has had. We examined traffic in Italy, Poland, and Spain, and demonstrated how we observed...</description>
	<link>https://www.akamai.com/blog/security/parts-of-a-whole-effect-of-covid-19-on-us-internet-traffic</link>
	<author>Martin McKeay</author>
	<guid>https://www.akamai.com/blog/security/parts-of-a-whole-effect-of-covid-19-on-us-internet-traffic</guid>
	<pubDate>Wed, 29 Apr 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Building Wave of Internet Traffic</title>
	<description>The Novel Coronavirus, and the resulting viral respiratory illness caused by it, COVID-19, is changing our world. As much as possible, people around the world are practicing social distancing. This means working remotely for a large number of people, possibly...</description>
	<link>https://www.akamai.com/blog/security/the-building-wave-of-internet-traffic</link>
	<author>Martin McKeay</author>
	<guid>https://www.akamai.com/blog/security/the-building-wave-of-internet-traffic</guid>
	<pubDate>Mon, 13 Apr 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Victims From a CDN's Point of View</title>
	<description>Overview Being a Content Delivery Network (CDN) platform, sometimes you can see fractions of attacks on the wire. In this blog, we will focus on phishing websites that, while not being delivered by the Akamai platform, are referring to or...</description>
	<link>https://www.akamai.com/blog/security/phishing-victims-from-a-cdns-point-of-view</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/phishing-victims-from-a-cdns-point-of-view</guid>
	<pubDate>Tue, 10 Mar 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Tackling DGA Based Malware Detection in DNS Traffic</title>
	<description>Earlier this year, Akamai's Enterprise team tackled the problem of DGA detection in the wild by using Neural Networks, essentially creating a state-of-the-art solution for near online detection of DGA communication....</description>
	<link>https://www.akamai.com/blog/security/tackling-dga-based-malware-detection-in-dns-traffic</link>
	<author>Yael Daihes</author>
	<guid>https://www.akamai.com/blog/security/tackling-dga-based-malware-detection-in-dns-traffic</guid>
	<pubDate>Tue, 18 Feb 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Abusing the Service Workers API</title>
	<description> The Service Worker web API is a powerful new API for web browsers. During our research, we have found several ways attackers can leverage this API to enhance their low-to-medium risk findings into a powerful and meaningful attack. By...</description>
	<link>https://www.akamai.com/blog/security/abusing-the-service-workers-api</link>
	<author>Daniel Abeles</author>
	<guid>https://www.akamai.com/blog/security/abusing-the-service-workers-api</guid>
	<pubDate>Mon, 20 Jan 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>HTTP Cache Poisoning Advisory</title>
	<description>Summary On January 14, 2020, CERT CC published an advisory warning of the potential use of Content Delivery Networks (CDNs) to cache malicious traffic. Akamai acknowledges this issue and has been aware of similar research in the past. This advisory...</description>
	<link>https://www.akamai.com/blog/security/http-cache-poisoning-advisory</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/http-cache-poisoning-advisory</guid>
	<pubDate>Mon, 13 Jan 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Fake Cozy Bear Group Making DDoS Extortion Demands</title>
	<description>A group calling themselves "Cozy Bear" has been emailing various companies with an extortion letter, demanding payment and threatening targeted DDoS attacks if their demands are not met....</description>
	<link>https://www.akamai.com/blog/security/fake-cozy-bear-group-making-ddos-extortion-demands</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/fake-cozy-bear-group-making-ddos-extortion-demands</guid>
	<pubDate>Fri, 15 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Detection via Analytic Networks</title>
	<description>As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to create an efficient...</description>
	<link>https://www.akamai.com/blog/security/phishing-detection-via-analytic-networks</link>
	<author>Tomer Shlomo</author>
	<guid>https://www.akamai.com/blog/security/phishing-detection-via-analytic-networks</guid>
	<pubDate>Wed, 06 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>New DDoS Vector Observed in the Wild: WSD Attacks Hitting 35/Gbps</title>
	<description>Additional research and support provided by Chad Seaman. Introduction Members of Akamai's Security Intelligence Response Team have been investigating a new DDoS vector that leverages a UDP Amplification technique known as WS-Discovery (WSD). The situation surrounding WSD was recently made...</description>
	<link>https://www.akamai.com/blog/security/new-ddos-vector-observed-in-the-wild-wsd-attacks-hitting-35gbps</link>
	<author>Jonathan Respeto</author>
	<guid>https://www.akamai.com/blog/security/new-ddos-vector-observed-in-the-wild-wsd-attacks-hitting-35gbps</guid>
	<pubDate>Wed, 18 Sep 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>XMR Cryptomining Targeting x86/i686 Systems</title>
	<description>I have been playing close attention to Internet of Things (IoT) malware targeting systems with Telnet enabled, while also collecting samples targeting systems with SSH enabled on port 22. I've collected over 650 samples landing in my honeypot within the...</description>
	<link>https://www.akamai.com/blog/security/xmr-cryptomining-targeting-x86i686-systems</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/xmr-cryptomining-targeting-x86i686-systems</guid>
	<pubDate>Fri, 30 Aug 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>HTTP2 Vulnerabilities</title>
	<description>On Tuesday, August 13th at 10 AM Pacific Time (1700UTC), Netflix publicly disclosed a series of vulnerabilities found by Jonathan Looney that impact many implementations of the HTTP2 protocol. A vulnerability found by Piotr Sikora of Google was also released...</description>
	<link>https://www.akamai.com/blog/security/http2-vulnerabilities</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/http2-vulnerabilities</guid>
	<pubDate>Tue, 13 Aug 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Criminals Using Targeted Remote File Inclusion Attacks in Phishing Campaigns</title>
	<description>In June 2019, logs on my personal website recorded markers that were clearly Remote File Inclusion (RFI) vulnerability attempts. The investigation into the attempts uncovered a campaign of targeted RFI attacks that currently are being leveraged to deploy phishing kits....</description>
	<link>https://www.akamai.com/blog/security/criminals-using-targeted-remote-file-inclusion-attacks-in-phishing-campaigns</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/criminals-using-targeted-remote-file-inclusion-attacks-in-phishing-campaigns</guid>
	<pubDate>Mon, 29 Jul 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Pykspa v2 DGA updated to become selective</title>
	<description>Additional research and information provided by Asaf Nadler Recent changes to the Pykspa v2 domain generation algorithm (DGA) have made it more selective. Akamai researchers have tracked these changes and believe that part of the reason for selective domain generation...</description>
	<link>https://www.akamai.com/blog/security/pykspa-v2-dga-updated-to-become-selective</link>
	<author>Lior Lahav</author>
	<guid>https://www.akamai.com/blog/security/pykspa-v2-dga-updated-to-become-selective</guid>
	<pubDate>Thu, 11 Jul 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>SIRT Advisory: Silexbot Bricking Systems With Known Default Login Credentials</title>
	<description>On June 25th, I discovered a new bot named Silexbot on my honeypot. The bot itself is a blunt tool used to destroy IoT devices. Its author, someone who claims to be a 14-year-old boy from Europe, has made his...</description>
	<link>https://www.akamai.com/blog/security/sirt-advisory-silexbot-bricking-systems-with-known-default-login-credentials</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/sirt-advisory-silexbot-bricking-systems-with-known-default-login-credentials</guid>
	<pubDate>Wed, 26 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>CloudTest Vulnerability (CVE-2019-11011)</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/cloudtest-vulnerability-cve-2019-11011</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security/cloudtest-vulnerability-cve-2019-11011</guid>
	<pubDate>Sun, 16 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Catch Me If You Can: Evasive and Defensive Techniques in Phishing</title>
	<description>Phishing is a multifaceted type of attack, aimed at collecting usernames and passwords, personal information, or sometimes both. Yet, these attacks only work so long as the phishing kit itself remains hidden. Phishing is a numbers game and time is...</description>
	<link>https://www.akamai.com/blog/security/catch-me-if-you-can-evasive-and-defensive-techniques-in-phishing</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/catch-me-if-you-can-evasive-and-defensive-techniques-in-phishing</guid>
	<pubDate>Wed, 12 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Bots Tampering with TLS to Avoid Detection</title>
	<description>Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are...</description>
	<link>https://www.akamai.com/blog/security/bots-tampering-with-tls-to-avoid-detection</link>
	<author>Security Intelligence Response Team</author>
	<guid>https://www.akamai.com/blog/security/bots-tampering-with-tls-to-avoid-detection</guid>
	<pubDate>Wed, 15 May 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Attacks Against Facebook / Google via Google Translate</title>
	<description>When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally....</description>
	<link>https://www.akamai.com/blog/security/phishing-attacks-against-facebook-google-via-google-translate</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/phishing-attacks-against-facebook-google-via-google-translate</guid>
	<pubDate>Tue, 05 Feb 2019 05:00:00 UTC</pubDate>

</item>

</channel>
</rss>
