Browsing category

Malware

Cryptojacking Malware Hits 8 Australian Webhosting Companies

Monero mining malware is in full swing now, as eight Australian companies reported that they were compromised with malware. The cybercriminals were able to monetize their Monero mining malware to the tune of $3900 worth of Monero coins. The mining activities have been active since May 2018, and it took the companies to disclose the […]

Hackers Bypass Google Filters & Launching CSV Malware via Google Sheets

Cybercriminals are using new sophisticated techniques to spread CSV malware via Google sheets instead of using Microsoft Excel sheet which is often used by malicious hackers. Cyber attackers are day today increasing and the attackers are always one step ahead to launching sophisticated cyber attackers which is very difficult to detect and mitigate. Basically .CSV […]

CookieMiner, An Active MacOS-based Cryptojacking Malware In The Wild Exposed

The very prolific Palo Alto Networks’ Unit 42 has made a huge discovery again, as they revealed to the public another cryptocurrency mining malware. Known as CookieMiner, it is a new crypto mining virus that specifically developed to target Mac hardware. Using cookies connected with login under MyEtherWallet, an interface service supporting Ethereum. “It sparked […]

APT39 Hacking Group Launch Widespread Attack Focused on Personal Information

Iranian cyber espionage group APT39 focus on stealing on personal information o perform monitoring, tracking, or surveillance operations against specific individuals. The group carrying a widespread campaign focused their operations in the Middle East, the U.S. and South Korea. Following are the industries targeted including telecommunications, travel industries, high-tech industry, and government entities. “We have […]

FORMBOOK Malware Delivered via Weaponized RTF Word Docs – Using CVE-2017-11882

Formbook campaign with what looks like a few changes. Recently the criminals distributing this malware have been using .exe files inside various forms of an archive, including .iso, .ace, .rar. , zip. Frequently they use various Microsoft Office Equation Editor exploits to contact a remote site & download the payload. Very occasionally I have seen […]

Malware Attack Using Google Cloud Computing Platform

Hackers have unleashed a global malware campaign using the Google cloud computing platform via weaponized PDF. Security researchers at the Netskope Threat Research Labs have detected this malware attack, which mostly targeted the banking and finance sector. Government firms too have been targeted worldwide. A recent Netskope blog post authored by Ashwin Vamshi states, “Netskope […]

Hackers Using Google Cloud Computing Platform To Deliver Targeted Malware Attacks via Weaponized PDF

Threat actors using Google computing platform (GCP) to deliver the malware through malicious PDF files. The attack targeting governments and financial firms worldwide. According to Netskope Threat Research Labs detected the targeted based on its 42 customers instances and likely the attacks to be launched by the infamous hacking group Cobalt Strike. Last year Cybercriminals […]

Hackers Now Launching Powerful Weaponized PDF Exploit using Steganography Technique

Cyber Criminals now using new Stenography technique to distribute a powerful Obfuscated PDF exploit in order to compromise the targets and evade the detection. Malicious hackers are always finding new techniques to exploit the vulnerabilities and compromising victims machine without more user interaction to increase the success ratio of the attack. Steganography is the technique […]

Redaman Banking Trojan of 2015 Resurrects, Targets Russian Email Users

A 2015-era banking trojan is seen actively spreading in the wild again, this time specifically targeting potential victims from a specific country only. Palo Alto Networks detected massive number of phishing emails containing the Redaman banking trojan targeting emails ending with .ru domain. Formerly known as RTM banking trojan in 2015, the Redaman malware is […]

New ransomware demands users to pay 10 Bitcoin or infect another thousand mining devices

Attackers threaten to collapse users’ mining platforms Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of a new ransomware variant especially targeted against Bitcoin mining platforms. So far, most known infection cases have been reported in China, as this is the country with the most cryptocurrency mining […]

ATTENTION: Torrents downloaded from The Pirate Bay contain a dangerous malware

Malicious hackers have infected some torrents on this platform with a malware functional in Windows operating systems Although in general this practice does not generate major drawbacks, experts in network security and ethical hacking from the International Institute of Cyber Security say that downloading a torrent involves taking some risks, as many of these files […]

Mac Users Targeted with Ad-Based Image Malware

Most people think that there’s little if any, Mac malware in the civilized world. Unfortunately, that impression is just wishful thinking. Well, we have seen how things shaped in 2018, and the increased targeting of the macOS platform by APT groups. We also saw how the criminals tried to exploit cryptomining and targeting those who […]

Anatova: The new ransomware infecting hundreds of devices around the world

This new and sophisticated malicious software is able to bypass the best security measures A new ransomware family discovered at the beginning of 2019 has generated alarm among the cybersecurity community due to its apparent modular features and its well-developed coding techniques, report specialists in network security and ethical hacking from the International Institute of […]

Phobos, the new ransomware of Dharma Group, infects hundreds of organizations

A new ransomware called Phobos is infecting devices and networks in a massive way A group of hackers is finding remote access to networks of different organizations to distribute new variants of ransomware. According network security and ethical hacking experts from the International Institute of Cyber Security, attackers are also infecting sites that share cracked […]