Browsing category

Malware

New tool to remove GandCrab ransomware encryption

A group of web application security testing experts has released a new version of the tool to remove the encryption imposed by the GandCrab ransomware; according to experts, this new tool could help millions of encryption malware victims unlock their files without having to negotiate a ransom with hackers. GandCrab is one of the most […]

GandCrab Ransomware Decryption Tool [All Versions] — Recover Files for Free

Cybersecurity researchers have released an updated version of GandCrab ransomware decryption tool that could allow millions of affected users to unlock their encrypted files for free without paying a ransom to the cybercriminals. GandCrab is one of the most prolific families of ransomware to date that has infected over 1.5 million computers since it first […]

Malicious Apps from Google PlayStore Bypassing SMS-Based Two-Factor Authentication and Steal OTPs in SMS

Researchers discovered new malicious Android apps from Google Play Store bypassing SMS-based two-factor authentication (2FA) mechanisms and steal the OTP without SMS’s permission. Google recently restrict other apps to use of high risk or sensitive permissions, including the SMS or Call Log in March 2019 that leads malware and credentials stealing apps lost its permissions. Newly uncovered malicious apps […]

What is Malware?

Any person who has ever used a computer has probably heard the term “malware.” It is everywhere, and the general consensus is that we have to be careful and protect ourselves from it. But what is the malware definition? What is it and why are people afraid of it? The first thing you have to […]

Modular Malware In The Nutshell

We are in the age of computing where programs are growing to a point towards feature-richness at best and bloatware at worst. Malware itself is also software, developers creating malware also have access to the same development environment as any other developers of legal software. They also realized that their malware was also starting to […]

Cyberattacks against gamer community keep growing

Specialists in IT security audits of the Kaspersky security firm recently published a report that talks about the cybercriminals’ growing interest in attacking the companies that are part of the video game industry. Experts found that, just this year, threat actors have launched more than 10 billion of credential-stuffing attacks against online gaming platforms and […]

Most Difficult Security Challenges for CxO (Chief x Officers) During the Cyber Attack

New Technologies are evolving rapidly nowadays and cybercriminals also traveling, in the same way, to increase the cyber risk factor to the organization as well as individuals and the impact are keep increasing that give more pain and responsibilities for CXO sometimes called the C-level Officers. Evolving advanced cyber threats such as DDoS Attacks are creating […]

Companies with Oracle WebLogic must be careful; cryptomining malware affects servers

A group of web application security experts from Trend Micro firm have detected a hacking campaign against Oracle WebLogic Server implementations to install malicious cryptocurrency mining software. Hackers exploit a vulnerability to install the miner bypassing the detection of system administrators. The National Vulnerability Database (NVD) published last April the security alert regarding a severe […]

First it was Baltimore, now Philadelphia is under malware attack

The Philadelphia online court system has been closed for a month due to a virus that has interrupted access to the network, report specialists from the IICS’s cybersecurity course.  “Suddenly the systems started to fail, I even thought the problem was on my computer”, said one of the system managers. This incident, in addition to […]

Hackers Exploit Critical Oracle WebLogic Server Vulnerability by Hiding Malware in Certificate Files(.cer)

Hackers abuse Oracle WebLogic Server Vulnerability CVE-2019-2725 to deliver Monero Miner. The vulnerability is easily exploitable, any unauthenticated attacker with HTTP access to the server can attack without authentication. Trend Micro observed a new cryptocurrency-mining activity involving the vulnerability and to hide the malicious code they used certificate files. Malware Infection Malware exploits CVE-2019-2725 to […]

Iranian MuddyWater APT Hackers Adds New Exploits in Their Hacking Arsenal to Attack Government Networks

Threat actors from MuddyWater APT groups now add a new set of latest exploits to their hacking arsenal and tactics, techniques and procedures (TTPs) to target government entities and telecommunication sectors. Iran sponsored MuddyWater group operating by advanced persistent threat actors and this APT group was initially spotted in 2017, they are mainly targeting the […]

Specialists detect new and dangerous cryptocurrency mining malware in Asia and U.S.

After a long time, the cryptocurrency mining script known as Coinhive has finally ceased to be a problem for system administrators and website visitors. However, cryptojacking remains one of the main cybersecurity threats. Specialists in IT security services have discovered a new malware variant that takes advantage of the victims’ hardware to mine virtual assets. […]

BlackSquid Malware Uses Eight Exploits to Attack Web Servers, Network Drives, and Removable Drives

A new malware dubbed BlackSquid bags eight notorious exploits to drop XMRig Monero cryptocurrency miner targeting web servers, network drives, and removable drives. The malware employs several anti-virtualization, anti-debugging, and anti-sandboxing methods to avoid detection. If the malware detects any sandboxes, it immediately cancels the infection process to avoid detections. Trend Micro observed that BlackSquid […]

Source code of tools used by malicious hackers from Iran is exposed

Some details about the hacking campaigns deployed by OilRig, a group of malicious hackers linked to the Iranian government have been revealed by a hacker group self called Lab Dookhtegan, reported cyber security service specialists. OilRig is a group of advanced persistent threats (APT) linked to Iran regime active at least since 2014. The main […]