Author: Christiaan Beek

Christiaan Beek Christiaan Beek manages threat intelligence research within Intel Security’s Office of the CTO. He leads research in advanced attacks and assists in cyberattack take-down operations. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, Intel Security’s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa. Beek develops threat intelligence strategy, designs threat intelligence systems, performs malware and forensic analysis, and coaches security teams around the globe. He is a passionate cybercrime specialist who has developed training courses, workshops, and presentations. He speaks regularly at conferences, including BlackHat and BlueHat. Beek contributed to the best-selling security book "Hacking Exposed." Twitter: @ChristiaanBeek

Sometimes the impact of an attack can extend well beyond the attack itself. Intel Security’s five-year threats projection report predicted that ransomware would become a major growth area, given higher ransom “returns” achievable from organizations suffering the potential loss from paralyzed organizational systems. By Q1 of 2016, these predictions have already come true. From February […]

This post was written by Christiaan Beek and Andrew Furtak. In 2015, Intel Security investigated a ransomware campaign that targeted the financial sector of a certain country. This was the first time we had observed ransomware targeting a particular sector. The infection vector in that case involved a phishing campaign directed at multiple financial institutions. […]

When we develop threats predictions at Intel Security, I personally like to conduct some proper research and base my statements on indicators of what we have seen in the field and what we believe will increase in the next six to 12 months. In the McAfee Labs 2016 Threats Predictions, we stated that ransomware would […]

Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used to disrupt supplies. Intel Security’s approach in understanding this event included making contact with the impacted organization to offer our support and, where possible, retrieving data in order to analyze the true nature of the […]

Updated, November 6:  Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall Version 3, we have spotted a new variant of the CryptoWall family. This variant has been labeled by many as Version 4, which is different in some ways from V3. This rapid update demonstrates how flexible the actors […]