Browsing tag

malware

New Fileless Cryptocurrency Miner Hits Windows Using EternalBlue Flaw

Cyber security firm Trend Micro’s research team has identified that the latest breed of cryptocurrency miner operates as a fileless malware, which means the malware exists in the memory of the infected system only. Its key targets are Windows based systems, and it uses the EternalBlue exploit to gain access to the system and being […]

New Vulnerability Discovered in LinkedIn Messenger That Allow to Spread Malware and Compromise the Victims PC

World’s largest professional network  LinkedIn That has more than 500 Million Registered users. LinkedIn messenger Platform Vulnerability Allows attacker spread Malware into victims by taking advantage of LinkedIn’s security restrictions Flow. LinkedIn messenger is the Mostly used Future Platform which helps for professional Community to Share their skills, Messenger easily sends resumes, transfer academic research and share […]

Uber users beware; Faketoken Android malware hits ride-sharing apps

The new version of Faketoken Malware Targets Uber-Like Apps to Steal Banking Credentials. Kaspersky Labs has identified malware in apps like Uber and has warned users to beware of a mobile banking Trojan Faketoken. It is an already known threat, but cybercriminals have now modified it to steal credentials from nu-taxis, hotel room booking, flight […]

LG service centers in S.Korea Possibly Hit By WannaCry ransomware

LG Electronics’ service centers have been targeted by cyber criminals leading to ransomware infecting of its self-service kiosks and blocking it from functioning Monday morning. The electronic giant informed about the situation to South Korea‘s government owned cyber security agency KISA (Korea Internet & Security Agency) who was able to tackle the situation as the infection […]

PowerPoint Slide Show Infected by New Malware that Exploiting Zero-day RCE Vulnerability

New Malware that abuses MS Power point slide show by Exploiting the CVE-2017-0199 (Zero-day remote code execution vulnerability) flow Exists in Windows OLE (Object Linking and Embedding). Malicious Rich Text File (RTF) documents used for Exploit this Vulnerability by using Microsoft Office interface to Deliver this Malware. This Malware used by the same Method of DRIDEX […]

Nigerian Man Hacked Thousands of Global Oil & Gas and Energy Firms

The IT security researchers at CheckPoint cyber security firm headquartered in Israel and the US has revealed that the recent series of cyber crimes against oil (1), mining (2), construction, and energy sector organizations (3) were perpetrated by a young hacker and not any nation-state sponsored hacker group. It comes as a big surprise considering that […]

How The Version Control System is found to be Vulnerable

Now comes a case where we see that version control systems are getting affected by malware. It is seen how source code is no longer safe and are said to be vulnerable to attacks and flaws. Three of the most popular version control systems are said to be vulnerable to malware attacks. Attackers run a […]

WannaCry hero back on Twitter after pleading not guilting over Kronos

He is not allowed to access the “Kill Switch” he created to stop WannaCry ransomware from spreading. 23-year-old Marcus Hutchins known for protecting thousands of users and business from WannaCry ransomware infection has pleaded not guilty over the accusation blaming him for his role in developing and distributing Kronos banking malware between 2014 and 2015 that […]

OLE flaw lets malware infected PowerPoint files evade antivirus detection

Microsoft PowerPoint is the latest platform used by cyber criminals for delivering malware. Reportedly, there is a vulnerability in the Windows Object Linking, and Embedding (OLE) interface that can be exploited to avoid detection by antivirus software. Malicious threat actors are using the OLE interface flaw to distribute infected Microsoft Office documents. According to Trend […]

Facebook password stealer; hacking the attacker rather than victim

How to hack a Facebook account is one the most searched keywords over the Internet and there are if not thousands then hundreds of websites claiming to provide Facebook account hacking service. But are these sites doing what they claim? Not at all. According to a Twitter user going by the handle of MalwareHunterTeam, a group […]

WikiLeaks: CIA’ CouchPotato Tool Remotely Collects Video Streams

WikiLeaks has released yet another CIA hacking tool as part of its Vault 7 series documents belonging to the American Central Intelligence Agency (CIA). This time, the whistleblowing platform has leaked the “User Guide for the CoachPotato project” of the agency work of which is to hack and obtain RTSP/H.264 video streams and still images remotely. The project CouchPotato is different from Dumbo […]

Fileless malware that uses PowerShell scripts from Window’s registry leading to Click Fraud Malware Campaign

Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. These types of malware sit in the system registry and making hard for Antivirus hard to identify the infection. The security researchers from Quick Heal Security Labs detected as Fileless malware which uses PowerShell scripts stored in the windows registry. […]

Researchers Encode Physical DNA with Malware To infect Computers

When DNA was synthesized, nobody had thought that it could be used to spread computer viruses, but a group of researchers from the University of Washington’s school of computer science and engineering have come up with a surprising new research. According to the research team, it is indeed possible to insert malicious malware into the […]

North Korea Hit By Konni and Inexsmar Malware After Missile Tests

An unknown hacking group has been targeting organizations in North Korea with Konni Malware. It is a RAT/remote access Trojan having all those features that any effective backdoor might have such as host profiling and remote access control. In 2017, already three different campaigns were identified by security experts against North Korean companies using this […]

Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure

A new research published last week by Willem Westerhof describing an outsized scale cyber attack targeting the crucial electrical infrastructure based on existing outline that he published in ITsec 2016. He titled as Horus scenario which focuses on Cyber attack on PhotoVoltaic-installations and recreating solar energy if an attacker gained control over PV-installations by injecting […]

WannaCry hero gets bail; pleading not guilty over Kronos malware

As you might know, 23-year-old Marcus Hutchins (@MalwareTechBlog on Twitter) who once made the news for stopping WannaCry ransomware attack was arrested by the FBI in Las Vagas while he was attending the BlackHat and DefCon hackers conferences.  The bureau charged him with developing and distributing Kronos banking malware and stealing banking details of the user in the […]

Hacker Sentenced More Than 3 Years Jail For Spreading Linux Malware

A Russian man accused of infecting tens of thousands of servers through Linux malware around the world to generate millions of dollars in fraudulent payments was imprisoned for 46 months (almost four years) in a federal prison in the United States. Maxim Senakh, 41, from Velikiy Novgorod, was arrested by the Finnish police in August […]

Hero Researcher Who Halted WannaCry Ransomware Arrested by FBI

An IT security researcher going by the Twitter handle of @MalwareTechBlog (real name Marcus Hutchins) has been detained by the law enforcement authorities in the United States. Hutchins, who is visiting States to attend Defcon, one of the world’s largest hacker conventions in Las Vegas, Nevada was arrested for unknown reasons Hutchins is the researcher who “saved” the world […]

Vault 7: CIA’ Dumbo Project Hijacking Webcams and Microphones

The Vault7 saga is far from over, and every passing week we are being introduced to a new set of tricks and tools that were allegedly used by the CIA for invading the privacy of security systems. CIA’s Dumbo Project is a system designed to manipulate Microphones, webcams and similar other devices installed on Microsoft […]

Banking Trojan Inspired By Wannacry To Add Self Spreading Ability

Even though WannaCry and Petya ransomware wave have slowed down, motivated by money laundering criminals, and hackers have taken world class outbreaks for their most powerful Banking Trojan. Security researchers have discovered at least one group of cyber criminals who are trying to give your banking Trojan self-spread worm capabilities that have made the recent […]

Dangerous Mobile Banking Trojan Uses Keylogger To Steal Everything

Security researchers have discovered that one of Android’s most dangerous Mobile banking Trojan family has been modified to add a keylogger for its recent stump, giving attackers another way to steal sensitive information to victims. Kaspersky Lab’s old malware analyst Roman Unuchek has discovered a new variant of the famous Android trojan, called Svpeng, in […]