Browsing tag

malware

5 Common network channels used by malware

Living in a modern digital era of computers can bring a lot of risks including data exfiltration to you and your PC. Computers are extremely vulnerable, and if the person on the other side of your network knows how to find the exact loophole in the system – you may suffer from huge loss of data […]

Hackers Spreading Digmine Monero Mining Malware via Facebook

If you frequently use Facebook Messenger then we advise that you open attachments in your messages a bit more wisely than before. Researchers at renowned cyber-security firm Trend Micro have discovered a malicious new cryptocurrency mining malware that specifically targets Facebook Messenger users . The malware has been dubbed as Digmine. It is hidden in […]

Loapi Cryptocurrency Mining Malware Can Really Destroy Your Phone

Security researchers from Kaspersky have discovered a new malware that is targeting Android phones. This malware, called as Loapi, is a harmful piece of code that can execute five separate malicious actions including mining the Monero cryptocurrency, making DDoS attacks, bombarding infected users with continuous ads, redirecting web traffic, transmitting text messages, and downloading and […]

WordPress Captcha Plugin Contains Backdoor- 300,000 Websites at Risk

A warning has been issued by researchers disclosing the identification of a backdoor in yet another WordPress plugin called Captcha. This plugin already has nearly 300,000 installations, which shows how popular it is among the users. However, when WordFence identified that a backdoor was added to it after an update was released on December 4. […]

Cyberespionage campaign Spreading AnubisSpy to Spying Skype, WhatsApp, Facebook, and Twitter

Newly emerging malware that combined with several malicious apps called AnubisSpy linked to cyberespionage campaign to steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories. its sophisticated capabilities also performing to take screenshots and record audio, including calls which basically targets Middle Eastern countries. This kind of spyware app Developers creating […]

Android malware posing as porn can literally make your phone’s battery explode

A strain of Android malware found lurking on third-party application stores is so packed full of nefarious capabilities it can cause physical damage to smartphones. Security experts from Moscow-based anti-virus company Kaspersky Lab said Monday (18 December) that a newly discovered Trojan – dubbed Loapi – exploited a handset to the extent that within two […]

New sophisticated Malware campaign Leveraging NSA Exploits to Mine Monero on Windows and Linux Systems

A new sophisticated malware campaign dubbed “Zealot” leveraging NSA exploits targeting Windows and Linux systems to mine Monero on Internal Networks. Security researchers from F5 Networks identified the malware campaign “Zealot” targeting internal networks Leveraging NSA Exploit EternalBlue and EternalSynergy. Zealot campaign is highly obfuscated, and it can deliver multistaged attacks. it exploits unpatched Apache […]

Attackers use TRITON malware to target industrial control systems (ICS)

Security researchers from FireEye and Dragos have discovered a nasty piece of malware targeting industrial control systems (ICS). The malware (called “TRITON” and “TRISIS”) was discovered after it was used against a victim in the Middle East, and unintentionally led to an automatical shutdown of the industrial process. TRITON has been specially designed to target […]

New Malware “TRITON” Manipulate and Shutdown the Industrial Control Systems

A dangerous malware family called “TRITON” distributing to attack Industrial control systems that leads to Perform an emergency shutdown the industrial processes. Researchers believe that this malware has capable to cause physical damage and inadvertently shut down operations. A Distributed Control System (DCS) provides human operators with the ability to remotely monitor and control an […]

Hackers Deploy Triton Malware to Shut Down Power Station

Cybersecurity firm FireEye’s Mandiant subsidiary responded to an incident caused by a new malware attempting to target Industrial safety systems of a critical infrastructure plant. The Triconex industrial safety technology developed by Schneider Electric SE was targeted with the malware with the sole aim of causing physical damages. The malware has been dubbed as TRITON […]

Still Stealing

Two years ago in October 2015 we published a blogpost about a popular malware that was being distributed from the Google Play Store. Over the next two years we detected several similar apps on Google Play, but in October and November 2017 we found 85 new malicious apps on Google Play that are stealing credentials for VK.com. […]

Banking malware on Google Play targets Polish banks

Another set of banking Trojans has found its way past Google Play’s security mechanisms, this time targeting a number of Polish banks. The malware managed to sneak into Google Play disguised as seemingly legitimate apps “Crypto Monitor”, a cryptocurrency price tracking app, and “StorySaver”, a third-party tool for downloading stories from Instagram. Besides delivering the […]

Microsoft Has Fixed A Critical Vulnerability In Malware Protection Engine

On Wednesday, Microsoft has released a patch for the Microsoft Malware Protection Engine (MPE) to fix a critical severity remote code execution (RCE) flaw in it. The vulnerability (tracked as CVE-2017-11937) has been discovered by UK’s National Cyber Security Centre (NCSC) that could lead to memory corruption and enable an attacker to execute arbitrary code […]

Linux.ProxyM used to Launch Numerous Hacking Attempts against Websites through Various Methods (SQL injections, XSS, LFI)

Linux.ProxyM malware was well known for infecting almost any Linux devices which include routers, set-top boxes, and other equipment. It affects the devices and launches a SOCKS proxy server on an infected device. It involved in various activities, in June it was used by cybercriminals to target Raspberry Pi devices for Mining Cryptocurrency, in September […]

Vulnerability in Intel Chip Puts Million of Devices at Risk

Intel the giant in chip making is in the news for all the wrong reason. It has been reported that the chip has vulnerabilities that will put millions of devices at risk. Researchers from Positive Technologies during the Black Hat Conference in Europe said that a particular flaw in Intel Chip stands to make devices […]

A New WordPress Malware called “wp-vcd” Distributes Via Pirated Themes

Denis Sinegubko (a security researcher from Sucuri) has discovered a new wave of the known malware wp-vcd that injects malicious WordPress admin users into vulnerable or hacked websites. The researcher said that the wp-vcd malware is preinstalled inside pirated WordPress premium themes published for download for free on some websites, he noticed that the malicious […]

Process Doppelgänging attack affects all Windows version & evades AV products

Researchers at endpoint security firm enSilo have identified a new attack that affects all Windows versions and allows attackers to use Microsoft Windows features to evade detection in prominent anti-virus products and infect a targeted device with malicious programs including malware. Dubbed ‘Process Doppelgänging‘ by Tal Liberman and Eugene Kogan of EnSilo, the attack was demonstrated during Black Hat […]

New Malware Evasion Technique Works On All Windows Versions

A team of security researchers has discovered a new malware evasion technique that could help malware authors defeat most of the modern antivirus solutions and forensic tools. Dubbed Process Doppelgänging, the new fileless code injection technique takes advantage of a built-in Windows function and an undocumented implementation of Windows process loader. Ensilo security researchers Tal Liberman and Eugene […]