Demystifying targeted malware used against Polish banks
The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland.
Browsing category
The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland.
Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups. APT28, the Russian hacking group tied to last year’s interference in the 2016 presidential election, has long been known for its advanced arsenal of tools for penetrating Windows, iOS, Android, and Linux devices. Now, researchers have uncovered an equally sophisticated malware package the group […]
A Brazilian man named Wallace Da Paula has discovered a bug in Windows 10 Mobile OS that lets anyone with access to your phone bypass your lockscreen passcode and access the device’s image gallery. The bug requires no technical skills, and anyone can reproduce it in a few easy steps. All is needed is physical […]
A game with love: How the LoveLetter virus corrupted our tech by playing on our emotions.
Researchers with Kaspersky Lab’s Global Research and Analysis Team Discovered the Fileless Memory-Based Malware Attacks Against More than 140 enterprises–primarily banks, government organizations, and telecommunications firms in 40 countries, including the U.S., France, and Ecuador–have been affected. The attackers, who may be connected to the GCMAN and Carbanak groups, aren’t using signature-based malware to carry […]
The Microsoft Publisher Documents utilized as a part of this battle was gone for infecting the victim with the, well known, Pony malware. While Pony is all around archived in specialized capacity it has not been known to utilize the .bar document organize as of not long ago. Horse is an accreditation collecting bit of […]
Our Previous post talked about the initial overview of the Shamoon 2.0 sample .This analysis is a continuation of our last post but with a more insight on the working and behavior of the malware. There are 3 components which are linked with one another which makeup Shamoon 2.0 single malware. We have analyzed each […]
An Iranian espionage group has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data from Mac users. A cyber espionage group linked to the Iranian Government has been using an unsophisticated strain of malware, dubbed MacDownloader, to steal credentials and other data from Mac computers. The researchers Claudio Guarnieri and […]
The Russia-linked cyber espionage group known as Turla has been using a new piece of JavaScript malware to profile victims, Kaspersky Lab reported on Thursday. Turla is the name of a Russian cyber espionage ATP group (also known as Waterbug, Venomous Bear and KRYPTON) that has been active since at least 2007 targeting government organizations […]
Malicious Word document with ‘Russian doll’ technique targets NATO countries. Security researchers have identified a hacking campaign seemingly targeted at NATO members, which employs a sophisticated method to infect victims and lays a trap for those investigating it. The researchers said the attack, in the form of a malicious Word document, is unusual in that […]
SVG has all the makings of a great malware distribution medium, and crooks are bound to migrate to this new file format, now that Google has moved to ban .js email attachments. SVG is an image file format that’s used to store scalable vector graphics (SVG) using XML syntax. Unknown to most is that developers […]
A ransomware infection has wreaked havoc at Romantik Seehotel Jägerwirt, a four-star hotel in the Austrian Alps, on the lip of the Turracher Höhe mountain lake. The incident took place earlier this month and hit the computer managing the hotel’s electronic key lock system, reservation system, and the cash desk system, according to local media. […]
First observed in July 2014, “Dridex,” a financial banking Trojan, is considered the successor to the “GameOver ZeuS” (GoZ) malware. • Dridex was most active between 2014 and 2015, and smaller campaigns were observed throughout 2016 with its peak activity in May 2016. • On January 25, 2017, the criminal syndicate behind Dridex launched another […]
We have to get very, very tough on cyber and cyber warfare… and backups? Cockrell Hill, Texas has a population of just over 4,000 souls and a police force that managed to lose eight years of evidence when a departmental server was compromised by ransomware. In a public statement, the department said the malware had […]
Top law enforcement officers, FBI director James Comey and Trump’s nominee for attorney general, Sen. Jeff Sessions, are supportive of giving law enforcement means to sidestep encryption. It seems likely that the Trump administration will push for policies forcing tech companies to create cryptographic backdoors in the name of helping law enforcement, a highly controversial […]
The VirLocker ransomware made a comeback this past week with a new and very virulent version, but the Malwarebytes security team says there’s a way for victims to recover files by entering a special code in the payment field. VirLocker, also known as VirLock or VirRansom, is a ransomware family that was first spotted by […]
New Android play Store Malware called HummingBad Download several million times by unsuspecting users and possible to gain all root access of the infected Android phone. Check Point researchers have found a new variant of the HummingBad malware hidden in more than 20 apps on Google Play. Earlier 2016, Check Point on customer’s devices was […]
A newly observed spam campaign is spreading a ransomware variant known as Sage 2.0 that is demanding a $2,000 ransom for the decryption key. Sage 2.0 is a new ransomware recently spotted by security experts, it was first observed in December and not now it is distributed via malicious spam. Sage is considered a variant of CryLocker ransomware, […]
Android malware known as HummingBad, that infected as many as 10 million devices in 2016, has resurfaced with several new features allowing it to perform ad fraud even more efficiently than its predecessor. Researchers said the variant, known as HummingWhale, was being distributed via 20 camera, music, flashlight and adult apps on Google Play. Google […]
If you were trying to use the public computers at St Louis Public Library this week you may have experienced more than your fair share of problems.
A new ransomware family is targeting Android devices, locking access to the screen, and constantly pestering the user to enter his payment card details. According to Fortinet researcher Kai Lu, the one who discovered this new threat, the ransomware appears to be targeting only Russian-speaking users, as its ransom note is only available in Russian. […]