Browsing tag

malware

Shodan’ Malware Hunter to Expose Command & Control Centers of Botnets

Recorded Future, a threat intelligence company together with Shodan, which is an internet search engine connecting services to internet devices, have created an online crawler which they call the Malware Hunter. What does it do? The Malware Hunter is a program that sends out signals similar to what a Trojan would send to its control-and-command […]

New Shodan Tool Can Find Malware Command and Control (C&C) Servers

Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices. Malware Hunter works via search bots that crawl the Internet looking for computers configured to function as a botnet C&C server. In […]

Malware Author Inflates Backdoor Trojan With Junk Data Hoping to Avoid Detection

A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals. Known only as “123”, this malware coder has been active since 2015, when he was first spotted deploying the XXMM malware. His activity falls in the category of […]

IBM Sent Off USB Sticks Infected with Malware

A new warning has been issued by IBM and the situation seems to be rather serious. According to the firm, there are a number of infected USB sticks out there with some very dangerous malware. The USB sticks in question were shipped with Storwize flash and they have hybrid storage systems. IBM suggests destroying the USB sticks […]

Americans No.1 Ransomware Target & Most Likely To Pay Up

Symantec, an IT security and software company, has released the latest volume of Internet security threat report and some of the facts written in the report are astonishing. The report states that the U.S was the most targeted country for ransomware and the number of people willing to pay the ransomware was also the highest […]

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encountered by the Check Point malware research team. This new malware – dubbed OSX/Dok — affects all versions of OSX, has 0 detections on VirusTotal (as […]

Linux Shishiga malware using LUA scripts

Among all the Linux samples that we receive every day, we noticed one sample detected only by Dr.Web – their detection name was Linux.LuaBot. We deemed this to be suspicious as our detection rates for the Luabot family have generally been high. Upon analysis, it turned out that this was, indeed, a bot written in Lua, […]

New Linux SSH Brute-force LUA Bot Shishiga Detected in the Wild

A new Linux malware has been spotted in the wild by security researchers at Eset, and it is much more sophisticated than any of the previously known Linux based malware. The security researchers have named this malware as “Linux/Shishiga” which utilizes four different protocols according to Eset research team. The protocols used are Telnet, HTTP and […]

Android Malware Posing as FIFA, Pokemon Go Guides Infected 600,000 Devices

A recently discovered strain of botnet malware has infected over 600,000 Android devices, as stated by the security researchers. Researchers have also found that the malware poses as a guide that wants to help gamers with online games like FIFA and Pokemon Go. These guides are actually a malicious software named FalseGuide. It’s been discovered […]

Webroot Antivirus Marked Facebook as Phishing Site and Windows as Malware

You may remember Google’s Safe Browsing Site Status mistakenly marking Google.com as a potentially dangerous domain to visit or the Google Maps mistakenly labeling Berlin Square as Hitler Square. Now another firm has joined this list, it’s Webroot Inc., a private American company, that provides Internet security software for consumers and businesses. It all happened on 24th April, […]

Webroot antivirus mistakenly flags Windows as malware

Windows’ system files were flagged as malicious, and Facebook was marked as a phishing site. A malware signature update issued by the company on Monday triggered the software into mistakenly flagging Windows system files as malware, melting down millions of managed systems around the world. The problem began in the afternoon on the US east […]

Point-of-Sale Malware Steals Driver’s License Information

Malware specialized in infecting Point of Sale (PoS) software has gained the ability to search and steal driver’s license information, according to a report published by US cyber-security firm Trend Micro. The collection of driver’s license information surprised researchers, who haven’t spotted such behavior in a PoS malware family until now. Even more surprising was […]

Malicious software bought by a London Police Officer can remotely hack users

One of the officers of UK’s Metropolitan Police Service was caught in possession of a malicious software used for infecting computers and smartphones after gaining physical access to them. It’s unclear as of yet whether this software was bought for official or personal use, but it does raise a question that why would an MPS’s […]

Interpol Identifies 8,800 C&C Servers Used for Malware, Ransomware, Others

Interpol investigators announced today they’d identified over 8,800 servers hosted across eight countries in Southeast Asia used for various cybercrime operations. According to Interpol, these are command-and-control (C&C) servers used as malware download centers, for spreading ransomware, launching Distributed Denial of Service (DDoS) attacks, and in spam distribution. Interpol only gathered the data, which it […]

Ops, hackers can exfiltrate data from air-gapped networks through a malware controlled via a scanner

A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled via scanners. The team was composed of Ben Nassi, a graduate student at the Cyber Security Research Center at Ben-Gurion University, and his advisor Yuval Elovici, based on an idea of the prominent cryptographer Adi Shamir. […]

Wikileaks Friday: “Weeping Angel” By CIA, A Hacking Tool For Your Television

Short Bytes: In their latest revelation, Wikileaks has released a user guide describing the working of the Weeping Angel tool designed by CIA and MI5 to compromise Samsung smart TVs. The malware is capable of recording audio from the built-in microphone which can be remotely extracted by the CIA. The whistleblower website Wikileaks has published another […]

Credit card stealing malware: 1200 InterContinental hotels breached

A few months earlier, it was reported that a number of InterContinental hotels have been targeted by a credit card stealing malware and now the IHG has confirmed that the reports were actually true. The attack is believed to have started in late September and since then, hackers have targeted at least 1200 InterContinental Hotels, according to TheVerge. Related: Hackers […]