Browsing tag

malware

All Android Version Except 8.0/Oreo are Vulnerable to Toast Overlay Malware Attack

A First Android malware called TOASTAMIGO has been discovered that capable of installing other malware into infected devices using Toast Overlay attack. Overlay attacks allow an attacker to draw on top of other windows and apps running on the affected device. With this recently found overlay assault does not require a particular permissions or conditions to […]

Fighting persistent malware with a UEFI scanner

The short answer to the headline’s question is that a UEFI scanner is all about helping you protect your computer against people who seek to take it over by abusing its Unified Extensible Firmware Interface (UEFI). A successful attack on a system’s UEFI can give the attacker complete control of that system, including persistence: the […]

Vault 8 – WikiLeaks releases source code for CIA Hive malware control platform

Wikileaks released the first batch of documents starting with the source code and development logs of the Project Hive. Today the popular whistleblower organization Wikileaks announced a new Vault 8 series that shed the light on the source code and the hacking infrastructure developed by the CIA. Anyone can access the source code and analyze it, likely in […]

Google Chrome will automatically block forced website redirects

Google is onto making some big changes in the way Chrome works as recently the tech and search engine giant has announced that the popular web browser will finally start blocking irritating website redirects. This means Chrome users won’t have to face those annoying, unwanted and surprise redirects to spammy sites. In their blog post, Product Manager for Google […]

PLAYING CAT & MOUSE: INTRODUCING THE FELISMUS MALWARE

For the past several weeks, Forcepoint Security Labs have been tracking a seemingly low-profile piece of malware which piqued our interest for a number of reasons: few samples appear to be available in the wild; there is no previous documentation referring to the C2 domains and IP addresses it uses (despite the domains appearing to […]

Malware signed with stolen Digital code-signing certificates continues to bypass security software

A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues to bypass security software. A recent study conducted by the Cyber Security Research Institute (CSRI) revealed that stolen digital code-signing certificates are available for sale for anyone to purchase on the dark web for up to $1,200. Digital code-signing certificates are a precious […]

Over 1 million Android users downloaded fake WhatsApp app

Scammers tricked over 1 million Android users into downloading a fake version of the popular messaging app WhatsApp pretending to be the official one. The app, now deleted, was called “Update WhatsApp” available on official Google Play Store. After being exposed, the developer of the fake app tried to trick users once again by renaming it to “Dual […]

Google Search Results Exploited to Distribute Zeus Panda Banking Trojan

Until now, we believed that to advertise and promote your business or brand, Search Engine Optimization (SEO) was the best possible solution. Similarly, users relied upon the search results on popular and trusted platforms like Google and clicked on the links without thinking twice. However, now we might need to be a bit more cautious […]

Dangerous Crypto Currency Mining Malware Apps Found on Google Play Store

New Dangerous Crypto Currency Mining  Malware Apps Discovered form Google Play store that is used for Mining Crypto currency using Android Mobile Phones by injecting the malicious javascript While Installing the Malware Contained Play store apps in Victims Mobile. Past few year Crypto currency mining is very easy method for cyber criminals to Generating the […]

Google Chrome Extension that Steals all Data Posted by Users on any Websites

Chrome Extensions continue to get compromised, security officer Renato Marinho from Morphus Labs identified a malicious Chrome extension that captures data posted by users online on any website. They noticed a phishing campaign titled “Follow the photos from the weekend (via WhatsApp)” which infects users by opening an email with alleged photos. How it affects […]

IoTroop Botnet: The Full Investigation

our researchers discovered a new and massive IoT Botnet, ‘IoTroop’. Due to the urgency of this discovery, we quickly published our initial findings in order to alert the cyber security community. Since then, we have had time to digest and dissect the propagating malware and share our findings with you. The main findings are: • The entire […]

EternalRomance NSA Exploit a Key Player in Bad Rabbit Ransomware Mayhem

Two days back we reported about the havoc caused by Bad Rabbit ransomware throughout Europe but mainly in Ukraine and Russia. It has been two days, but security experts are still unable to identify how Bad Rabbit is compromising devices at such a massive scale. Initially, it was believed that a customized scanning mechanism which […]

Kaspersky says NSA hacking tools obtained after malware was found

Apparently, a pirate download of Microsoft Office could be the root of all the trouble. Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was lifted from a PC for analysis but insists the theft was not intentional. In October, a report from The Wall Street Journal claimed that in 2015, the Russian firm targeted […]

Exclusive – CSE ZLab experts spotted a new Wonder botnet in the wild

The CSE CybSec Z-Lab Malware Lab spotted a new botnet, dubbed Wonder botnet, while it was investigating malicious code in the dark web. While investigating the malicious code in the dark web, ZLab experts discovered a “NetflixAccountGenerator.exe” that promises to generate a premium account for Netflix services for free. Unfortunately, the software downloaded does not work […]

Microsoft’ New Feature to Protect Windows 10 from Ransomware

Since ransomware are quite common nowadays, and no device is spared from the malicious objectives of cybercriminals, therefore, security firms and tech giants are trying to provide some reliable solutions to users. It is a fact that just by installing anti-virus software it is not possible to properly secure your computer through becoming a victim […]

Assemblyline – Canada’s CSE intelligence Agency releases its malware analysis tool

Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed Assemblyline. The Canada’s Communications Security Establishment (CSE) intelligence agency has released the source code for one of its malware detection and analysis tools dubbed Assemblyline. The Assemblyline tool is written in Python and was developed under the CSE’s […]

Malware in firmware: how to exploit a false sense of security

When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types of dangerous malware that run inconspicuously might get less of our attention; as is the case with firmware malware or bootkits. Bootkits run before the OS […]

Canada’s Spy Agency Releases its Cyber-Defense Tool for Public

The Communications Security Establishment (CSE), Canada’s main signals intelligence agency, has made a malware scanning and analytics tool called AssemblyLine as open-source by releasing the code. AssemblyLine tool can analyze massive volumes of files and also rebalance workload automatically. During the scanning process, every file is given a unique identifier, and user-defined analytics engines scan […]