UK markets close in 1 hour 26 minutes

PFPT Oct 2020 110.000 call

OPR - OPR Delayed price. Currency in USD
Add to watchlist
0.7000-0.3100 (-30.69%)
As of 3:54PM EDT. Market open.
Full screen
Previous close1.0100
Open1.2000
Bid0.0500
Ask1.4000
Strike110.00
Expiry date2020-10-16
Day's range0.7000 - 1.8800
Contract rangeN/A
Volume71
Open interest324
  • Botnet Fights Back After Microsoft’s Election Security Takedown
    Bloomberg

    Botnet Fights Back After Microsoft’s Election Security Takedown

    (Bloomberg) -- A week after Microsoft Corp. led a global attack against one of the world’s most prolific malware groups, the company says it’s winning an ongoing battle to temporarily destabilize the malicious botnet ahead of the U.S. presidential election.When Microsoft and its coalition of partners attacked the infrastructure supporting the popular Trickbot malware, they identified 69 servers and routers hosting the botnet around the world. As of Oct. 18, they’d compromised 62 of them, according to a Microsoft statement. A botnet is a network of computers infected with malware.In response, Microsoft observed Trickbot’s operators attempt to add 59 new servers to try to salvage their botnet. But those, too, were successfully infiltrated by Microsoft’s team within hours of adoption, according to the company.In all, Microsoft officials said they’ve “taken down” 120 of those 128 systems.“As we expected, the criminals operating Trickbot scrambled to replace the infrastructure we initially disabled,” according to Microsoft’s statement. “We fully expect that Trickbot’s operators will continue looking for ways to stay operational. What we’re seeing suggests Trickbot’s main focus has become setting up new infrastructure, rather than initiating fresh attacks.”Microsoft and its partners started their attack on Oct. 9 after winning a court order to disrupt Trickbot, known for infecting and stealing troves of data before exposing victims to ransomware attacks. Cyber-attackers use ransomware to lock users out of their own computers, while demanding payment in exchange for a key to regain access. The threat of ransomware in the days leading up to the Nov. 3 presidential election remains a credible cybersecurity threat against voting systems, according to the U.S. Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security.In less than a week, Microsoft’s operation has produced results.When the attack started, Trickbot’s system included “many thousands” of active victims, which have since been reduced to “just more than 200,” said Alex Holden, founder of the information security investigations firm Hold Security LLC. However, Trickbot’s operators are still armed with the login credentials stolen from its many millions of victims breached in the last five years. Those could still be used to execute a damaging elections-related ransomware attack, if those credentials include access to state and local governments, he said.“The botnet is down but not out,” said Holden, whose specializes in investigating complex malware systems. “It’s not mission accomplished.”Along with activating existing credentials, Trickbot may also attempt to salvage its malicious network by renting space from other botnet operators. This will likely take weeks or months, Holden said.Microsoft’s Tom Burt, corporate vice president for customer security & trust, said it would be a victory just to stifle Trickbot until the U.S. elects its next president. Getting rid of the botnet altogether is a monumental task that will require support from a global coalition, he said. That includes the continued support of internet service providers and server hosts around the world, including in the U.S., Germany, South Korea, Indonesia, Kyrgyzstan, Brazil and Cambodia, he said.In the days after Microsoft announced its attack, skeptics such as cyber researchers at Proofpoint Inc. and Intel 471 questioned Microsoft’s ability to successfully execute a sustained attack. “Typically, these types of actions don’t result in a direct reduction of threat activity,” said Sherrod DeGrippo, senior director of threat research and detection at Proofpoint.Intel 471 found that Trickbot had returned as early as Oct. 15. However, Microsoft’s early efforts have mitigated some of that skepticism.“If you can’t arrest them, disruption is the next best thing,” said Mark Arena, chief executive officer of Intel 471. “But these guys can and have added new servers all the time. A definitive takedown is asking a lot, but if Trickbot operators are busy on the run trying to fix their infrastructure, then maybe they can keep them on the run until the election.”For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.

  • When Should You Buy Proofpoint, Inc. (NASDAQ:PFPT)?
    Simply Wall St.

    When Should You Buy Proofpoint, Inc. (NASDAQ:PFPT)?

    While Proofpoint, Inc. (NASDAQ:PFPT) might not be the most widely known stock at the moment, it received a lot of...

  • Chinese Hackers Targeted European Officials in Phishing Campaign
    Bloomberg

    Chinese Hackers Targeted European Officials in Phishing Campaign

    (Bloomberg) -- A Chinese nation-state hacker group targeted European government officials, diplomats, non-profits and other global organizations in a phishing campaign designed to gather intelligence about global economies reeling from the pandemic, according to cybersecurity experts.In March, hackers from a group known as APT TA413 sent phishing emails mimicking the World Health Organization’s Covid-19 guidance in an attempt to lure victims into clicking on an attachment containing malicious code, the cybersecurity firm Proofpoint Inc. said in a report Wednesday. It said the malicious email was sent to “numerous entities involved with economic policy and forecasting within Europe.”The same strain of malware was discovered in a phishing campaign in July targeting Tibetan dissidents, which the TA413 hacker group is best known for targeting, Proofpoint said.The malware, called Sepulcher, allows attackers to read, write and delete files, among other functionalities. It’s not clear to what extent the hackers were able to penetrate the networks of the groups that were targeted.The campaign’s focus on economic, diplomatic and legislative entities in Europe suggests a momentary realignment for the Chinese hackers “to collect information on global economies cast into upheaval as a result of Covid-19,” according to the report.Top officials at the World Health Organization have also been targeted by suspected nation-state hackers earlier this year as they continue to lead the global response to the coronavirus pandemic.The European Union in late July issued its first ever cyber-related sanctions against targeted individuals and entities, which included those involved in hacking operations tied to Chinese spies.The Proofpoint report comes amid warnings from the U.S. that Chinese hackers are targeting research on possible coronavirus treatments and vaccines. In July, the U.S. Department of Justice accused two Chinese hackers of trying to to steal data, including virus research, from Western companies in 11 countries.For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.