When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached Storage devices. While it was known
![VPNFilter: a nation state campaign for surveillance and destruction](https://blogs.juniper.net/wp-content/uploads/2020/05/Image-1_Blue-Globe-Network.png)
VPNfilter is a campaign to compromise small office and home routers as well as Network Attached Storage devices from several popular manufacturers. According to a Cisco Talos blog, there are
![Nukebot Banking Trojan targeting people in France](https://blogs.juniper.net/wp-content/uploads/2020/01/Threat-Research-16182936.jpg)
Nukebot (aka TinyNuke, or NuclearBot) made the news in spring of 2017 when the author released the source code in an attempt to restore their/his/her reputation in the cybercrime ….
![Practical tips for preventing Ransomware](https://blogs.juniper.net/wp-content/uploads/2018/05/Image-1_Red-Skull.png)
Crypto ransomware seems to be a never-ending threat in today’s cyber world. It’s comparable to the “Kaiju” in the 2013 Hollywood blockbuster, Pacific Rim. One crypto ransomware dies and another
![Juniper Threat Labs at RSA: Mobile Threat Inspector](https://blogs.juniper.net/wp-content/uploads/2020/05/Image-1_MobileThreatInspector.png)
What is your phone up to? Your average enterprise security team requires access to all traffic in order to provide the secure environment that companies need to safely perform their
![BitPaymer Ransomware hides behind windows Alternate Data Streams](https://blogs.juniper.net/wp-content/uploads/2020/05/Threat-Research_v2_color.png)
Threat name: BitPaymer Ransomware IOC Hash: Sha256: 8943356b0288b9463e96d6d0f4f24db068ea47617299071e6124028a8160db9c IOC Files: Files encrypted changed to extension .locked Files ending with Readme_txt are created containing the Ransom Notes BitPaymer ransomware was first
![Wave of Spam Uses RTF Exploit, Delivers a Trojan-Spyware](https://blogs.juniper.net/wp-content/uploads/2020/01/Threat-Research-16182936.jpg)
During the early weeks of February 2018, Juniper Threat Labs detected several malicious email campaigns involving a malicious MS Office file. The file attachment is an RTF file that includes
![New Gootkit Banking Trojan variant pushes the limits on evasive behavior](https://blogs.juniper.net/wp-content/uploads/2020/05/Threat-Research_v1_color.png)
Background On January 19, 2018, Juniper Threat Labs detected a Gootkit banking trojan at one of our customers sites. The file was hosted on a compromised golfing site, namely “carolinalakesgc[.]com”.
![Meltdown & Spectre: Modern CPU vulnerabilities](https://blogs.juniper.net/wp-content/uploads/2020/05/Image-1_Blue-Circuit-Board.png)
Today, chatter has increased significantly about a set of related vulnerabilities that impact several modern CPUs that perform speculative instruction execution, amongst which Intel and AMD chips. These vulnerabilities allow