This Malware converts your Computer into a Cryptocurrency Miner

Zcash, a cryptocurrency that debuted on 28th October 2016, is believed to be more anonymous than the overhyped Bitcoin. This new virtual currency has attracted the attention of investors, academics as well as hackers since the latter have managed to use this new currency for their malicious purposes. Reportedly, hackers are installing software on Windows-based computers […]

SSMA – Simple Static Malware Analyzer

SSMA is a simple malware analyzer written in Python 3. Features: Searches for websites, e-mail addresses, IP addresses in the strings of the file. Looks for Windows functions commonly used by malware. Get results from VirusTotal and/or upload files. Malware detection based on Yara-rules – https://virustotal.github.io/yara/ Detect well-known software packers. Detect the existence of cryptographic […]

Affordable Android Phones Coming with Malware Injected in Stock Firmware

Security firm warns of Trojans shipping with stock firmware. Russian security company Dr. Web, who also makes a PC antivirus solution bearing the same name, warns that it discovered a total of 26 smartphone models running Android and infected with malware that’s injected in the stock firmware they are shipped with. Most of the models on […]

Scammers spreading celebrity nude PDFs on Facebook, pushing malware installation

Google Chrome is one of the most used Internet browsers but lately, it is being used by cybercriminals and scammers to infect users with adware, malware and other malicious programs due to the low level of scrutiny on its web store. Recently, an Internet security firm Cyren discovered a malicious Chrome extension spreading nude celebrity PDFs all […]

Microsoft PowerShell Becomes a More Popular Malware-Spreading Tool

Symantec warns of growing number of malicious scripts. Microsoft PowerShell is a really powerful tool for IT professionals running Windows, and the Redmond-based software giant is making it the default shell in the operating system, but security experts say that cybercriminals are also increasingly using it for spreading malware. Security firm Symantec have analyzed malicious […]

Malwarebytes 3.0 Is Here To Kill Your Antivirus, Scans PC 3-4 Times Faster

Short Bytes: Malwarebytes is here with its latest product, Malwarebytes 3.0. It’s a combination of different modules like Anti-Malware, Anti-Ransomware, Website Protection, and Anti-Exploit. The existing users can download the new version and it’ll be automatically activated. Malwarebytes is one the few PC-protection software that is actually useful. It’s a leading malware prevention and remediation solution that […]

Spoofing the Address Bar with the Malware Warning

Over the last few months, we’ve seen a proliferation of these tech-support scams where users end up “locked” in their browsers with horrible red-screens and messages like “your computer may be at risk“. This is not new of course, but scammers are using more and more tricks to fool their victims. They render red warnings or […]

Five new malware programs are discovered every second

A new report from the respected independent testing agency AV-Test.org reveals some scary-sounding facts about the state of malware today. According to AV-Test.org, it has 578,702,687 malware samples in its testing database – with over 115 million discovered so far during 2016 alone. That translates to 4-5 new malware samples every second of every day. […]

Android Malware Uses TeamViewer Mobile App to Take Control of Remote Devices

Crooks are spreading Android malware disguised as a one-time password (OTP) generator app for banking apps that steals the user’s banking credentials and then installs the TeamViewer QuickSupport app to allow attackers to take over the victim’s phone. Researchers say this threat (ANDROIDOS_FAKEBANK.OPSA) is part of a two-year-old malware distribution campaign called Operation Emmental. This […]

Saudi Arabian Central Bank Systems Targeted with Shamoon Malware

Saudi officials are blaming Iranian government for conducting a sophisticated malware attack on computer networks across Saudi Arabia over the past two weeks causing damages to Saudi Arabian Monetary Agency, the country’s central bank. Also Read: Iran’s Key Petrochemical Complexes Attacked by Malicious Malware The investigations are currently underway to discover further details about the intensity […]

Avalanche malware network hit with law enforcement takedown

Symantec plays part in takedown of the Avalanche malware-hosting network. The Avalanche malware-hosting network has been dealt a severe blow following the takedown of infrastructure used by at least 17 malware families. The takedown operation, which was a combined effort by multiple international law enforcement agencies, public prosecutors, and security and IT organizations including Symantec, […]

OMG….Over 1 million Google accounts may have been breached by Gooligan malware

  Check your google account is hacked or not by Gooligan World’s  biggest  Cyber Security  firm checkpoint software revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number continues to rise at an additional 13,000 breached devices each day. Check Point reached out […]

New Proteus Malware Can Mine for Crypto-Currency, Log Keystrokes, and More

A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various types of crypto-currencies, can log keystrokes, and check the validity of stolen online accounts. Detected by security researchers from Fortinet, this new malware family is written in .NET and current evidence reveals that […]

ImageGate attack – Malware through poisoned .JPG

ImageGate attack : Security people from Check Point Software Technologies identified a new malware  campaign through Facebook. Crooks leverage an image obfuscation trick, dubbed ImageGate, to spread the Locky ransomware via Facebook. Experts highlighted that the image obfuscation trick is able to bypass Facebook’s security checks. As per the research, the attackers have built a new capability […]

Millions Steal from European ATMs by Hackers using Malware that Spit Out coins

Hackers Steal from European ATMs ATM hackers who lengthy trusted processes of stealing payment card numbers. Online banking credentials to steal millions are actually focused on the bank itself to scouse borrow coins immediately from the machines. Earlier this 12 months, a gang of cyber criminals inflamed several ATMs with malware in Taiwan and Thailand […]

Global Cyber Security Firm “Comodo Threat Research Labs” (CTRL) Detects New Family of Sophisticated Financial Malware

Comodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6), and take over the operating system. The financial malware seeks system privileges and user credentials, […]

Malware can Convert your Headphones into Microphone for Hackers

We know that our computer or laptop’s webcam is quite vulnerable to hacking and usually hiding their webcam’s lens with a piece of tape is the only way out. Some add another level of security and hide their microphones too so that their audio conversations couldn’t be recorded by cyber-criminals or government spies (Just like […]

Hackers Are Using MailChimp to Spread Malware

You probably know MailChimp either as an email newsletter service, or the company that seems to have adverts on every single podcast you’ve ever listened to. Hackers recently jumped on that popularity, and managed to send out emails containing malicious links to subscribers of various different companies. The incident shows that hackers will likely use […]

[ TECHNICAL TEARDOWN: EXPLOIT & MALWARE IN .HWP FILES ]

This article will focus on teaching analysts on analysing malicious JavaScript code within the HWP files and a walkthrough of how we can analyse .HWP files that was used to deliver malware. [ 1st Sample used in the analysis ] MD5: 8EB5A3F38EB3DE734037AA463ADE7665 SHA256: D0361ADB36E81B038C752EA1A7BDC5517B1E44F82909BC2BD27B77B2652667EE As of writing, the detection rate for this sample according to […]