Author: Christiaan Beek

Christiaan Beek Christiaan Beek manages threat intelligence research within Intel Security’s Office of the CTO. He leads research in advanced attacks and assists in cyberattack take-down operations. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, Intel Security’s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa. Beek develops threat intelligence strategy, designs threat intelligence systems, performs malware and forensic analysis, and coaches security teams around the globe. He is a passionate cybercrime specialist who has developed training courses, workshops, and presentations. He speaks regularly at conferences, including BlackHat and BlueHat. Beek contributed to the best-selling security book "Hacking Exposed." Twitter: @ChristiaanBeek

Coauthored by Raj Samani, Chief Technology Officer of Intel Security’s Europe, Middle East, and Africa division Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used to disrupt supplies. Intel Security’s approach in understanding this event included making contact with the impacted organization to offer […]

Updated, November 6:  Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall Version 3, we have spotted a new variant of the CryptoWall family. This variant has been labeled by many as Version 4, which is different in some ways from V3. This rapid update demonstrates how flexible the actors […]

This week, joint research on the CryptoWall Version 3 family was released by the Cyber Threat Alliance. In Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat, Intel Security along with the other member of the CTA, researched the elements in the CryptoWall lifecycle, represented in the following graphic: Source: Cyber Threat Alliance, Lucrative […]

For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of ransomware in depth, we frequently saw the same questions: “Why is ransomware increasing, and why is it so successful? In our report we offered a few answers to this question. We’d like to zoom in […]

We have seen an increasing amount of articles published about the “Dark Web,” underground cybercriminal sites that are hosted on hidden servers and can be accessed only by using Tor. One example of a Dark Web site hosted on one of these “.onion” domains was the Silk Road, a site infamous for the buying and […]