Browsing category

Malware

APT15 Hackers Using Steganography Technique to Drop Okrum Backdoor Via PNG File to Evade Detection

Researchers discovered a previously unseen malware called Okrum that distributed from APT15 threat group via a hidden PNG file with steganography technique to evade detection. APT15 threat group also known as Ke3chang has a long history of its malicious activities since 2010, and it was initially reported in 2013 during their campaign activity attack organization in […]

After Florida, Indiana & Canada, the same ransomware infects china

Specialists in system audits have detected a new ransomware variant that has already managed to infect more than a hundred private companies and government institutions in the United States and, most recently, in China. Tencent, the company in charge of the report, claims that the attacks are directed from Asian territory. The report mentions that […]

Hackers Attack Financial Institutions & Government Organizations With “Proyecto RAT”

Security researchers observed a new campaign targeting financial institutions and governmental organizations with a customized version of a remote access tool called “Proyecto RAT”. The payload found to be written in Visual Basic 6 and it uses Disposable E-mail Address service yopmail for its C&C communication. The yopmail is known for creating temporary inboxes. Infection […]

Ransomware next target is your favorite radio stations and television channel companies

Cybersecurity services specialists reported a ransomware attack that temporarily affected the operations of the community radio station WMNF 88.5 – FM, based in Tampa, Florida. According to statements by interim general manager Cindy Reichard, that nasty incident began sometime on June 18. The next day, one of the radio station’s programmers detected strange behavior on […]

New Linux Malware “EvilGnome” Spying on Linux Desktop Users and Steal Sensitive Files

Researchers discovered a new Linux malware called “EvilGnome” with previously unseen functionalities that capable of creating a backdoor and spying the Linux desktop users. Based on the evidence and the operational similarities, the implant possibly distributed by Gamaredon Group, a Russian based threat group that has been active since at least 2013. Gamaredon Group attack victims using […]

What Is The True Score of AI VS Malware?

We admit here in hackercombat.com, we are one of the cybersecurity news organizations that somewhat hyped Artificial Intelligence (AI) when it comes to cybersecurity. We wrote numerous articles heralding the “hero” that will save us from the seemingly endless cat and mouse race between discovering a vulnerability that is currently exploited, and the time the […]

GrandCrab ransomware master keys released by the FBI

Ransomware is one of the most common cyber threats that users face nowadays. According to IT security audit experts, every few days groups of threat actors launch new campaigns to infect users, encrypt their files and demand ransoms in exchange for compromised information access. Although there are dozens of variants of encryption malware, one of […]

EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users

Security researchers have discovered a rare piece of Linux spyware that’s currently fully undetected across all major antivirus security software products, and includes rarely seen functionalities with regards to most Linux malware, The Hacker News learned. It’s a known fact that there are a very few strains of Linux malware exist in the wild as […]

TrickBot’s “TrickBooster” Update Compromised 250M Emails

Last Valentines day, we made a fearless declaration here in Hackercombat.com, that Trickbot is shaping itself of becoming the “malware of the year”, due to its massive campaigns of infecting computers worldwide. That will remain as our forecast; Trickbot was recently named by the DeepInstinct security researchers as responsible for the compromise of at least […]

New Miori Malware Uses Text-based Protocol to Communicate with C&C Server for Launching a DDoS Attack

A new Mirai variant dubbed Miori uses text-based protocols to establish communication with command-and-control (C&C) servers. The Miori campaign was identified in last year December, exploiting vulnerability n the ThinkPHP programming framework. Miori targets IoT devices and exploits them by taking advantage of the vulnerabilities and integrate them to the botnet network to launch various […]

Hackers encrypt all college computers with ransomware: $2 million ransom

Officials at Monroe College, a private university based in New York, recently reported a cybersecurity incident that affected its operations. According to system audit specialists, the hackers in charge of the attack compromised the academic institution’s computer systems, demanding a ransom of more than $2 million in exchange for restoring their systems.   The university’s administrative […]

Buhtrap Hackers Group Using Recently Patched Windows Zero-day Exploit to Attack Government Networks

An Infamous Cyberespionage group known as “Buhtrap” uses a Windows Zero-day exploit for its new campaign to attack businesses and perform targeted attack governmental institutions. Buhtrap hackers group actively targeting various financial institutions in 2015, since then the group improvising their toolset with new exploits and malware to attack Europe and Asia based countries. Newly observed […]

25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities

Researchers discovered a new Android malware called “Agent Smith” that infects nearly 25 million mobile users around the globe without letting users know about the malicious activities. Agent Smith malware activities have a similar appearance of previously reported malware campaigns such as Gooligan, HummingBad, and CopyCat. Malware posed as a legitimate Google app and takes […]

Pale Moon Archive Server Infected With Malware

Hackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software. The lead developer of Pale Moon, Mr. C. Straver, said the hack was undetectable for more than 18 months. The Pale Moon file server is used to host an earlier version of the […]

More than 25 million smartphones infected with new malware hidden in WhatsApp

An investigation conducted by system audit specialists from the security firm Check Point has revealed the existence of new smartphone malware; dubbed “Agent Smith”, this malware has already infected more than 25 million users worldwide, mainly in India, where around 15 million cases of infection have been detected. This malware hides from the user disguising […]

Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar

One of the most powerful, infamous, and advanced piece of government-grade commercial surveillance spyware dubbed FinSpy—also known as FinFisher—has been discovered in the wild targeting users in Myanmar. Created by German company Gamma International, FinSpy is spying software that can target various mobile platforms including iOS and Android, we well as desktop operating systems. Gamma […]

Microsoft Spotted New Fileless Malware “Astaroth” that Abusing Legitimate Tools To Hack Your Windows

A widespread fileless malware campaign called Astaroth spotted with the “lived off the land” method to attack Windows users with advanced persistent technique to evade the detection. Microsoft uncovered this fileless malware using anomaly detection algorithm and the observation of sudden spike in the use of Windows Management Instrumentation Command-line (WMIC) tool to run the […]