Browsing category

Malware

North Korea suspected in hack of South Korea’s cyber command

North Korea appears to have hacked South Korea’s cyber command in what could be the latest cyberattack against Seoul, the military here said Tuesday, . “It seems the intranet server of the cyber command has been contaminated with malware. We found that some military documents, including confidential information, have been hacked,” an official at the […]

Spoofing the Address Bar with the Malware Warning

Over the last few months, we’ve seen a proliferation of these tech-support scams where users end up “locked” in their browsers with horrible red-screens and messages like “your computer may be at risk“. This is not new of course, but scammers are using more and more tricks to fool their victims. They render red warnings or […]

Millions exposed to malvertising that hid attack code in banner pixels

Manipulated images are almost impossible to detect by the untrained eye. Millions of people visiting mainstream websites over the past two months have been exposed to a novel form of malicious ads that embed attack code in individual pixels of the banners. Researchers from antivirus provider Eset said “Stegano,” as they’ve dubbed the campaign, dates […]

Petya Ransomware Returns with GoldenEye Version, Continuing James Bond Theme

The author of the Petya-Mischa ransomware combo has returned with a new version that uses the name GoldenEye Ransomware, continuing the malware’s James Bond theme. Brought to our attention today by a Bleeping Computer user named gizmo21, this new “GoldenEye” ransomware is almost identical to past Petya and Mischa variants. GoldenEye Petya variant spreading via […]

Five new malware programs are discovered every second

A new report from the respected independent testing agency AV-Test.org reveals some scary-sounding facts about the state of malware today. According to AV-Test.org, it has 578,702,687 malware samples in its testing database – with over 115 million discovered so far during 2016 alone. That translates to 4-5 new malware samples every second of every day. […]

Canadian Government Is Asking Citizens If They Want Encryption Backdoors

The Canadian government is asking citizens for their feedback on several privacy and cyber-security topics, as part of a public consultation period for upcoming changes to Canada’s national security framework. The online feedback page touches on a series of hot topics such as encryption backdoors, ISP data retention, basic subscriber information, and law enforcement interception […]

Stegano exploit kit poisoning pixels

Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of malicious ads, is capable of performing this dirty job.

Android Malware Uses TeamViewer Mobile App to Take Control of Remote Devices

Crooks are spreading Android malware disguised as a one-time password (OTP) generator app for banking apps that steals the user’s banking credentials and then installs the TeamViewer QuickSupport app to allow attackers to take over the victim’s phone. Researchers say this threat (ANDROIDOS_FAKEBANK.OPSA) is part of a two-year-old malware distribution campaign called Operation Emmental. This […]

Avalanche malware network hit with law enforcement takedown

Symantec plays part in takedown of the Avalanche malware-hosting network. The Avalanche malware-hosting network has been dealt a severe blow following the takedown of infrastructure used by at least 17 malware families. The takedown operation, which was a combined effort by multiple international law enforcement agencies, public prosecutors, and security and IT organizations including Symantec, […]

PluginPhantom: New Android Trojan Abuses “DroidPlugin” Framework

Recently, we discovered a new Google Android Trojan named “PluginPhantom”, which steals many types of user information including: files, location data, contacts and Wi-Fi information. It also takes pictures, captures screenshots, records audios, intercepts and sends SMS messages. In addition, it can log the keyboard input by the Android accessibility service, acting as a keylogger. […]

New Proteus Malware Can Mine for Crypto-Currency, Log Keystrokes, and More

A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various types of crypto-currencies, can log keystrokes, and check the validity of stolen online accounts. Detected by security researchers from Fortinet, this new malware family is written in .NET and current evidence reveals that […]

Hackers Are Using MailChimp to Spread Malware

You probably know MailChimp either as an email newsletter service, or the company that seems to have adverts on every single podcast you’ve ever listened to. Hackers recently jumped on that popularity, and managed to send out emails containing malicious links to subscribers of various different companies. The incident shows that hackers will likely use […]

Watch out, Locky ransomware spread via SVG images on Facebook Messenger

Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images. The Locky Ransomware is spread via a downloader, experts noticed that it is able to bypass Facebook defense measures by pretending to be a harmless  image file. The campaign was first spotted during the weekend by the malware […]

RIG-E Exploit Kit now distributing New CHIP Ransomware

Brad Duncan, a security researcher for Rackspace, is well known for monitoring exploit kit activity and the payloads that are being distributed by them. In an article posted yesterday, Brad shows how the RIG-E (Empire) exploit kit has started to distribute a new ransomware called CHIP. When a visitor browses to a site compromised with […]

Crypton Ransomware Is Here and It’s “Not So Bad”

Security researcher MalwareHunterTeam has discovered a new ransomware family that its creators have named Crypton. After a flood of poorly coded .NET-based ransomware families have invaded VirusTotal, Crypton is a little bit more complex. “It’s a ‘good’ one,” MalwareHunterTeam told Bleeping Computer on Twitter. “At least compared to the latest .NET ones, this is not […]

Android banking malware whitelists itself to stay connected with attackers

New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background. Recent variants of Android.Fakebank.B have been updated to work around the battery-saving process Doze. The variants display a pop-up message asking the user to add the threat to the Battery Optimizations exceptions whitelist. If this technique works, then […]

Chinese company installed secret backdoor on hundreds of thousands of phones

In “mistake,” AdUps collected data from BLU Android phones in US. Security firm Kryptowire has uncovered a backdoor in the firmware installed on low-cost Android phones, including phones from BLU Products sold online through Amazon and Best Buy. The backdoor software, initially discovered on the BLU R1 HD, sent massive amounts of personal data about the […]

Researcher finds the Karma Ransomware being distributed via Pay-per-Install Network

A security researcher named slipstream/RoL has discovered the Karma Ransomware, which pretends to be a Windows optimization program called Windows-TuneUp. What is worse is that this sample was discovered as software that would potentially be distributed by a pay-per-install software monetization company when people install free software downloaded from the Internet. I have been railing against adware […]