Browsing category

Malware

Malware Used to Attack Polish Banks Contained False Flags Blaming Russian Hackers

Malware samples used in the recent attacks against several Polish banks contained planted evidence that attempted to blame the attacks on Russian-speaking hackers. These false flags, as the (IT and real-world) security community refers to these planted clues, were discovered by Sergei Shevchenko, a Russian-speaking security expert for BAE Systems. In a report published this […]

New TeamSpy Malware Campaign Turns TeamViewer into Spy Tool

The malware can affect anyone downloading the wrong mail attachment and unzipping the file onto their computers. TeamSpy is back and it’s turning TeamViewer into the spying tool that no one wants.  According to security firm Heimdal, a new spam campaign emerged over the weekend, carrying the TeamSpy malware which can give hackers full access […]

8 things you should know about spyware

Spyware is defined as a “generic term for a range of surreptitious malware such as keyloggers, remote access trojans, and backdoor trojans, especially those that allow remote surveillance of passwords and other sensitive data”. The term can also refer to “more aggressive adware”, which collects user information such as visited websites, installed applications, and other personal […]

Hackers are using this Android malware to spy on Israeli soldiers

Social engineering employed to distribute ViperRAT malware which uses infected devices to take photos and record audio. Hackers are carrying out surveillance on members of the Israeli military by hacking into their Android phones in order to monitor activity and steal data – potentially including photos and audio recordings – according to security companies. Developed […]

Hermes Ransomware Decrypted in Live Video by Emsisoft’s Fabian Wosar

Emsisoft CTO and Malware Researcher Fabian Wosar has stated in the past that he wanted to perform an educational live stream about reversing malware. Today, after GDaata security researcher Karsten Hahn discovered a new ransomware called Hermes, Fabian decided to use it as the sample for his first live streaming session. The best part of it is that it turns […]

Commercial Remote Access Trojan (RAT) Remcos Spotted in Live Attacks

A remote access Trojan (RAT) is a malware program that incorporates a back door for administrative control over the objective PC. RATs are normally downloaded invisibly with a client trusted program like games, Email attachments. Remcos RAT was first sold in hacking forums in late 2016 and from that point it get’s updated with more […]

New Mac malware pinned on same Russian group blamed for election hacks

Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups. APT28, the Russian hacking group tied to last year’s interference in the 2016 presidential election, has long been known for its advanced arsenal of tools for penetrating Windows, iOS, Android, and Linux devices. Now, researchers have uncovered an equally sophisticated malware package the group […]

Windows 10 Mobile Bug Exposes Personal Photos on Locked Devices

A Brazilian man named Wallace Da Paula has discovered a bug in Windows 10 Mobile OS that lets anyone with access to your phone bypass your lockscreen passcode and access the device’s image gallery. The bug requires no technical skills, and anyone can reproduce it in a few easy steps. All is needed is physical […]

Fileless Memory-Based Malware Attacks Against 140 Banks, Enterprises Networks in 40 Countries

Researchers with Kaspersky Lab’s Global Research and Analysis Team Discovered the  Fileless Memory-Based Malware Attacks Against  More than 140 enterprises–primarily banks, government organizations, and telecommunications firms in 40 countries, including the U.S., France, and Ecuador–have been affected. The attackers, who may be connected to the GCMAN and Carbanak groups, aren’t using signature-based malware to carry […]

Detailed threat analysis of Shamoon 2.0 Malware

Our Previous post talked about the initial overview of the Shamoon 2.0 sample .This analysis is a continuation of our last post but with a more insight on the working and behavior of the malware. There are 3 components which are linked with one another which makeup Shamoon 2.0 single malware. We have analyzed each […]

Iranian hackers are back with the MACDOWNLOADER MAC malware

An Iranian espionage group has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data from Mac users. A cyber espionage group linked to the Iranian Government has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data from Mac computers. The researchers Claudio Guarnieri and […]

Russian cyber espionage group Turla leverages on a new JavaScript Malware

The Russia-linked cyber espionage group known as Turla has been using a new piece of JavaScript malware to profile victims, Kaspersky Lab reported on Thursday. Turla is the name of a Russian cyber espionage ATP group (also known as Waterbug, Venomous Bear and KRYPTON) that has been active since at least 2007 targeting government organizations […]

These hackers set a ‘trap’ for security researchers probing their malware

Malicious Word document with ‘Russian doll’ technique targets NATO countries. Security researchers have identified a hacking campaign seemingly targeted at NATO members, which employs a sophisticated method to infect victims and lays a trap for those investigating it. The researchers said the attack, in the form of a malicious Word document, is unusual in that […]

SVG Image Format Set for Wider Adoption in Malware Distribution

SVG has all the makings of a great malware distribution medium, and crooks are bound to migrate to this new file format, now that Google has moved to ban .js email attachments. SVG is an image file format that’s used to store scalable vector graphics (SVG) using XML syntax. Unknown to most is that developers […]

Ransomware Infects Electronic Door Locking System at Austrian Hotel

A ransomware infection has wreaked havoc at Romantik Seehotel Jägerwirt, a four-star hotel in the Austrian Alps, on the lip of the Turracher Höhe mountain lake. The incident took place earlier this month and hit the computer managing the hotel’s electronic key lock system, reservation system, and the cash desk system, according to local media. […]

Dridex Banking Trojan Returns, Leverages New UAC Bypass Method

First observed in July 2014, “Dridex,” a financial banking Trojan, is considered the successor to the “GameOver ZeuS” (GoZ) malware. • Dridex was most active between 2014 and 2015, and smaller campaigns were observed throughout 2016 with its peak activity in May 2016. • On January 25, 2017, the criminal syndicate behind Dridex launched another […]

Texas cops lose evidence going back eight years in ransomware attack

We have to get very, very tough on cyber and cyber warfare… and backups? Cockrell Hill, Texas has a population of just over 4,000 souls and a police force that managed to lose eight years of evidence when a departmental server was compromised by ransomware. In a public statement, the department said the malware had […]

Expect renewed push for encryption backdoors from Trump administration

Top law enforcement officers, FBI director James Comey and Trump’s nominee for attorney general, Sen. Jeff Sessions, are supportive of giving law enforcement means to sidestep encryption. It seems likely that the Trump administration will push for policies forcing tech companies to create cryptographic backdoors in the name of helping law enforcement, a highly controversial […]