Browsing category

Malware

Hackers Steal Over $800,000 By Dropping a Malware On Cod Community College Computer Systems

The Cape Cod Community College suffered a massive cyber attack, the attackers steal college banking information and allegedly transfer $807,130 from College. The attack starts with a phishing email. Cyber Criminals currently targeting various colleges and universities around the worlds through social engineering and malware attack on employees and students. The attacks start with the […]

DanaBot Banking Trojan Evolves Again – Steals Email Address From Victim’s Mailbox

DanaBot Banking Trojan came out with new features which harvest email addresses from the victim’s mailbox and send out spam emails. This Trojan turned out to be the latest example for the malware which focused on stealing useful information rather than demanding ransom from victims. The campaign primarily focuses on corporate and public administration emails. DanaBot […]

Hackers Exploiting Adobe Flash Zero-Day that Launching via a Microsoft Office Document

APT group widely exploiting the new Adobe flash 0day vulnerability via MS word document and the vulnerability allows attackers to execute the malicious flash object into victims machine. Attackers mainly targeting Russian state healthcare clinic through the crafted document that contains several pages in order to forge employee to open it and exploiting this Flash 0day vulnerability. Distributing […]

Thousands of PCs infected with new ransomware variant in China

A new malware variant has been discovered in China; this malicious program has infected over 100k devices in less than a week Digital forensics specialists from the International Institute of Cyber Security report that a new variant of ransomware is quickly spreading in China. So far, the infection has already reached over 100k computers over […]

The Dark Side of the ForSSHe

ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, “The Dark Side of the ForSSHe”, they release analysis of 21 malware families to improve the prevention, detection and remediation of such threats

UPnProxy – A Dubbed NSA Hacking Tool of EternalSilence Vulnerable to Attack 277,000 UPnP Enabled Routers

New research reveals that  Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking tool arsenal. UPnP is a feature that allows the devices on your network to discover each other and allow to access certain services. Often, this is used for streaming media between devices on a network. […]

Cyber Attack Prevention Checklist to Keep Your Business Safe & Secure From Hackers

Cyber Security manages business risk during the full cycle(monitor, assess, advise, re-mediate). It fights against the cybercrime: detection of attacks and fraud attempts. It increases security on services platforms, infrastructures, and networks. Here is the Cyber Attack Prevention checklist. There are loads of minimal effort, simple-to-setup methods that can enhance Cyber Security inside the organization. We […]

Upgraded TrickBot Malware Attack Point-of-Sale Machines & Services to Steal Credit/Debit card Data

Trickbot, a Banking Trojan that involved various cyber attacks especially target the banking networks, now distributing to target the POS services and machines to steal credit cards and ATM cards bank related sensitive data. Recently TrickBot’s malicious activities on various browsers and apps such as  Microsoft Outlook, Chrome, Firefox, IE, Edge to Steal Password & […]

Best way to Remove Malware on Mac, Including Other Unwanted Apps

Some Mac apps are so persistent that you can’t use traditional methods to remove them. Even if you do, there will always be some app remnants that clog up your system’s memory and resources. Programs like malware are case in point. They’re notoriously hard to remove, and even if you get rid of the main […]

Malaysia’s largest media company becomes victim of a ransomware attack

The hackers have demanded a ransom of $6.45M USD Media Prima Berhad, Malaysia’s leading media company, has been attacked by a ransomware campaign in which the attackers demanded the company to make a payment of $6.45M USD in exchange for encryption keys, as reported by specialists in digital forensics from the International Institute of Cyber Security. Anonymous […]

Sednit: What’s going on with Zebrocy?

In August 2018, Sednit’s operators deployed two new Zebrocy components, and since then we have seen an uptick in Zebrocy deployments, with targets in Central Asia, as well as countries in Central and Eastern Europe, notably embassies, ministries of foreign affairs, and diplomats

Most of the ATM’s Around the World Can be Hacked Under 30 Minutes

Recent research revealed that most of the ATM’s around the world are vulnerable to compromise and cash out from the ATM by attackers within 30 min. Cyber criminals are using various sophisticated methods including physical access and remote access by compromise the bank network in order to steal the money from  ATM. Recent ATM based […]

Court attributes John McAfee ‘liability’ for the death of a neighbor

The entrepreneur has always been involved in controversy John McAfee, an information security community personality, has been found legally ‘liable’ for the death of his neighbor, who was found dead because of a gunshot wound to his head at his home in Belize, in the year 2012, report experts in digital forensics and cybersecurity from […]

Cryptocurrency Mining Malware Targets Linux Machines Uses Rootkit to Hide From Monitoring Tools

A new cryptocurrency mining malware bundled with rootkit components targets Linux machines to mine cryptocurrency and hides from monitoring tools. Security researchers from Trend Micro discovered the cryptocurrency mining malware’s dubbed KORKERDS affecting the Linux systems. Researchers believe the malware was distributed through some compromised plugins if the compromised plugin is installed and admin permissions […]

Researchers reveal the malware used by North Korean hackers to attack ATMs

The Lazarus hackers have been using the FastCash Trojan on obsolete AIX servers to steal tens of millions of dollars The researchers of the information security and digital forensics firm Symantec have discovered the malware tool that Lazarus, North Korea’s famous hacker group, has been using for a couple of years to steal millions of dollars […]