Browsing category

Malware

Locky Ransomware Fuels Surge in .RAR, JavaScript Attachments

Why is it critical to stop ransomware at the gateway layer? Because email is the top entry point used by prevalent ransomware families. Based on our analysis, 71% of known ransomware families arrive via email. While there’s nothing new about the use of spam, ransomware distributors continue to employ this infection vector because it’s a tried-and-tested method. It’s also an […]

MALWARE EVADES DETECTION WITH NOVEL TECHNIQUE

Researchers have found a new strain of document-based macro malware that evades discovery by lying dormant when it detects a security researcher’s test environment. The malware, according to researcher Caleb Fenton with security firm SentinelOne, evades detection simply by counting the number of documents – or the lack thereof – that reside on a PC […]

Don’t Touch It — Hackers Are Sending Malicious USB Sticks In Your Mail

Short Bytes: A recent study has suggested that people are inclined towards popping any random USB stick into their computers without a second thought. Interestingly, the Aussie hackers are exploiting this habit by putting malicious USB sticks in people’s mailboxes. The local cops have warned the residents of these devices and urged them to inform […]

Tick, tock, tick, tock: New malware is hitting your network every four seconds

A Check Point report suggests organisations’ security hasn’t kept pace to meet a ninefold rise in malicious software. An exponential rise in malware means employees are at their highest-ever risk of accidentally installing malicious software onto an enterprise network — an event that happens every four seconds within the average company, a new report has […]

Just For Men website serves malware

The website for Just For Men, a company that sells various products for men as its name implies, was serving malware to its visitors. Our automated systems detected the drive-by download attack pushing the RIG exploit kit, eventually distributing a password stealing Trojan. In this particular attack chain we can see that the homepage of justformen[.]com […]

InfoArmor Uncovers Malicious Torrent Distribution Network

InfoArmor has identified a special tool used by cybercriminals to distribute malware by packaging it with the most popular torrent files on the Internet. The bad actors have analyzed trends on video, audio, software and other digital content downloads from around the globe and have created seeds on famous torrent trackers using weaponized torrents packaged […]

Ransomware is lucrative: Attacker’s profits near $100 million

Hackers are increasingly targeting healthcare institutions with malware because of their poor cyber-security posture, reliance on legacy IT systems, third-party services and the need to access information as soon as possible in order to deliver great patient care. These are the conclusions released in a new report entitled McAfee Labs Threats Report: September 2016. It […]

HDDCryptor Ransomware Overwrites Your MBR Using Open Source Tools

HDDCryptor, sometimes spelled HDD Cryptor and also identified as Mamba, is a new ransomware variant that rewrites a computer’s MBR (Master Boot Record) boot sectors and locks users out of their PCs. While we might hurry to classify this as a Petya clone, HDDCryptor predates both Petya and Satana, being spotted on the Bleeping Computer forums […]

Mozilla plans fix for same malware vulnerability with Tor [updated]

Mozilla officials say they’ll release a Firefox update on Tuesday that fixes the same cross-platform, malicious code-execution vulnerability patched Friday in the Tor browser. The vulnerability allows an attacker who has a man-in-the-middle position and is able to obtain a forged certificate to impersonate Mozilla servers, Tor officials warned in an advisory. From there, the […]

PSA: DetoxCrypto Ransomware imitating Malwarebytes

Scammers will always try and imitate legitimate tools and services in an effort to trick people into harming their accounts and devices. If it isn’t fake logins, it’s dubious links on social media. If we’re wading knee deep in 419 emails, you can bet another round of tech support scams will be along in a […]

LuaBot Author Says His Malware Is “Not Harmful”

Author says he’s not interested in launching DDoS attacks. Two weeks ago, a security researcher that goes by the name of MalwareMustDie had come across a new Linux trojan that according to him was the first ever Linux malware coded in the Lua language. Reverse analysis of the code proved that the trojan targeted mainly IoT […]

A backdoor on Xiaomi device allows silent and remote deliver of any app

A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any app on Xiaomi phones. A Dutch Computer Science student, Thijs Broenink, who analyzed his Xiaomi mobile device discovered the presence of a backdoor that could allow an attacker to silently install any app on the phone. The […]

Shark Ransomware Rebrands as Atom for a Fresh Start

The Shark Ransomware Project that appeared in July 2016 has rebranded as the Atom Ransomware Affiliate Program, offering an improved service for crooks that want to start a life in cyber-crime. We don’t know why the project rebranded, but there have been several reports from security vendors and various media publications that have broken down […]

Recent POS malware attacks signal a need for app security for mobile payments

In the past, hackers have most often gone after specific merchants when seeking cardholder information. Recent attacks on point-of-sale (POS) vendors, however, may signal a drastic shift in how these cybercriminals operate, and certainly signal a need for application security for mobile payments. More than 10 POS vendors, including MICROS, have been compromised within the […]

DualToy Windows Trojan Secretly Sideloads Apps on Android and iOS Devices

Number of DualToy infections is on the rise. A trojan targeting Windows computers is secretly sideloading mobile applications to any Android or iOS devices the user is connecting to infected PCs via USB cables. The trojan, named DualToy, has been active since January 2015, but in its original form, it was only capable of infecting Android […]

Bad Press Forces Shark Ransomware Project to Rebrand

Shark Ransomware Project rebrands as Atom. The Shark Ransomware Project has recently rebranded and switched to a new domain in an attempt to start from scratch, calling itself Atom – a ransomware affiliate program. The change comes after a series of news articles that gave it a bad reputation, including ours, published last month, in which […]

Doctor Web discovers the first Linux Trojan that is written in Rust language

Experts from Dr Web discovered a new Linux Trojan called Linux.BackDoor.Irc.16 that is written in the Rust programming language. It is a prolific period for Vxers working on Linux Trojan, a new strain was recently spotted by experts from Doctor Web. The new Linux Trojan has been named Linux.BackDoor.Irc.16 and is written in the Rust programming language.Rust […]

Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives

Malware authors have made around $86,400, so far. A malware variant named Mal/Miner-C (also known as PhotoMiner) is infecting Internet-exposed Seagate Central Network Attached Storage (NAS) devices and using them to infect connected computers to mine for the Monero cryptocurrency. Miner-C, or PhotoMiner, appeared at the start of June 2016, when a report revealed how this […]

WINDOWS MEDIA PLAYER DRM USED FOR MALWARE

Movie and TV watchers who download pirated content have long been warned of the potential for malware that might accompany their chosen media. Now use is again being made of Digital Rights Management (DRM) functionality — designed to prevent piracy — to distribute malware. The new attack, brought to Cyren’s attention by security researcher Amitay […]

Down but Not Out! Dridex Begins Targeting Crypto-Currency Wallets

The Dridex banking trojan might be involved in fewer attack campaigns, but its developers are still outfitting it with some new functionalities, including the ability to target crypto-currency wallets. Nicholas Griffin, senior security researcher at Forcepoint, explains Dridex relies on two lists to target users’ banking credentials: “These lists have gradually expanded over the months […]

Locky now using Embedded RSA Key instead of contacting Command & Control Servers

According to security researcher Timothy Davies, a new version of the Locky Ransomware, aka Zepto, has been circulating since around the September 5th 2016 that includes an embedded RSA key. This key allows Locky to encrypt a victim’s computer without having to contact their Command & Control server. As many system administrators block Command & Control servers on their […]