Compromised Email Accounts
Reporting Period: September 24, 2018 
Action recommendation: Users should immediately place each of these email accounts in a block status in intrusion prevention systems. 
 Wapack Labs conducted a CTAC collection for malicious activity, analyzing all data containing Motor Vessel (MV) in the subject line of malicious emails. Email subject line Motor Vessel (MV) impersonation is a common TTP for attackers targeting the maritime industry. Wapack Labs is providing this monthly list of Motor Vessels in which Wapack Labs directly observed the vessel being impersonated, with associated malicious emails.
Wapack Labs conducted a CTAC collection for malicious activity, analyzing all data containing Motor Vessel (MV) in the subject line of malicious emails. Email subject line Motor Vessel (MV) impersonation is a common TTP for attackers targeting the maritime industry. Wapack Labs is providing this monthly list of Motor Vessels in which Wapack Labs directly observed the vessel being impersonated, with associated malicious emails.  DeepLocker is a class of malware that use AI (Artificial Intelligence) to infect a victim’s system.  DeepLocker was developed and launched by an IBM research group.[1]  Their concept is artificial intelligence can automatically detect and combat malware to effectively stop cyber-attacks before they impact an organization.  This positive concept can now theoretically be used in reverse and weaponized by bad actors.  This to power a new generation of malware that can evade even the best cyber-security defenses and infect a computer network or launch an attack; even when with strong two-party authentication. Read More ...
DeepLocker is a class of malware that use AI (Artificial Intelligence) to infect a victim’s system.  DeepLocker was developed and launched by an IBM research group.[1]  Their concept is artificial intelligence can automatically detect and combat malware to effectively stop cyber-attacks before they impact an organization.  This positive concept can now theoretically be used in reverse and weaponized by bad actors.  This to power a new generation of malware that can evade even the best cyber-security defenses and infect a computer network or launch an attack; even when with strong two-party authentication. Read More ...