Browsing tag

malware

How AV can open you to attacks that otherwise wouldn’t be possible

New AVGater flaw provided key ingredient for hacker to hijack computer. Antivirus programs, in many cases, make us safer on the Internet. Other times, they open us to attacks that otherwise wouldn’t be possible. On Friday, a researcher documented an example of the latter—a vulnerability he found in about a dozen name-brand AV programs that […]

A c espionage group has been using a new strain of malware dubbed Reaver

Experts at Palo Alto Networks have discovered a new malware family named Reaver with ties to hackers who use the SunOrcal malware. A China-linked cyber espionage group has developed a new strain of malware, dubbed Reaver, that was already observed in highly targeted attacks during 2016. The malware was analyzed by experts at Palo Alto Networks, who spotted […]

New Vulnerability Exploits Antivirus Programs to Install Malware

It is common notion that antivirus software keeps our computers safe from all types of bugs and malware. However, it seems that cybercriminals are hell-bent on changing this belief by using these programs for fulfilling their malicious objectives. As per the findings of Kapsch’s security researcher Florian Bogner, hackers have learned to exploit the Restore […]

RunPE: How to hide code behind a legit process

Hiding a process has always being challenging for malware writers, and they found many ways to do so. The tip I’ll talk about is very basic, yet simple to write, but doesn’t work all the time. This trick is known under the name “RunPE” and has been used many time in malware industry, especially in RATs (Remote Administration Tools). Basically, […]

All Android Version Except 8.0/Oreo are Vulnerable to Toast Overlay Malware Attack

A First Android malware called TOASTAMIGO has been discovered that capable of installing other malware into infected devices using Toast Overlay attack. Overlay attacks allow an attacker to draw on top of other windows and apps running on the affected device. With this recently found overlay assault does not require a particular permissions or conditions to […]

Fighting persistent malware with a UEFI scanner

The short answer to the headline’s question is that a UEFI scanner is all about helping you protect your computer against people who seek to take it over by abusing its Unified Extensible Firmware Interface (UEFI). A successful attack on a system’s UEFI can give the attacker complete control of that system, including persistence: the […]

Vault 8 – WikiLeaks releases source code for CIA Hive malware control platform

Wikileaks released the first batch of documents starting with the source code and development logs of the Project Hive. Today the popular whistleblower organization Wikileaks announced a new Vault 8 series that shed the light on the source code and the hacking infrastructure developed by the CIA. Anyone can access the source code and analyze it, likely in […]

Google Chrome will automatically block forced website redirects

Google is onto making some big changes in the way Chrome works as recently the tech and search engine giant has announced that the popular web browser will finally start blocking irritating website redirects. This means Chrome users won’t have to face those annoying, unwanted and surprise redirects to spammy sites. In their blog post, Product Manager for Google […]

PLAYING CAT & MOUSE: INTRODUCING THE FELISMUS MALWARE

For the past several weeks, Forcepoint Security Labs have been tracking a seemingly low-profile piece of malware which piqued our interest for a number of reasons: few samples appear to be available in the wild; there is no previous documentation referring to the C2 domains and IP addresses it uses (despite the domains appearing to […]

Malware signed with stolen Digital code-signing certificates continues to bypass security software

A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues to bypass security software. A recent study conducted by the Cyber Security Research Institute (CSRI) revealed that stolen digital code-signing certificates are available for sale for anyone to purchase on the dark web for up to $1,200. Digital code-signing certificates are a precious […]

Over 1 million Android users downloaded fake WhatsApp app

Scammers tricked over 1 million Android users into downloading a fake version of the popular messaging app WhatsApp pretending to be the official one. The app, now deleted, was called “Update WhatsApp” available on official Google Play Store. After being exposed, the developer of the fake app tried to trick users once again by renaming it to “Dual […]

Google Search Results Exploited to Distribute Zeus Panda Banking Trojan

Until now, we believed that to advertise and promote your business or brand, Search Engine Optimization (SEO) was the best possible solution. Similarly, users relied upon the search results on popular and trusted platforms like Google and clicked on the links without thinking twice. However, now we might need to be a bit more cautious […]

Dangerous Crypto Currency Mining Malware Apps Found on Google Play Store

New Dangerous Crypto Currency Mining  Malware Apps Discovered form Google Play store that is used for Mining Crypto currency using Android Mobile Phones by injecting the malicious javascript While Installing the Malware Contained Play store apps in Victims Mobile. Past few year Crypto currency mining is very easy method for cyber criminals to Generating the […]

Google Chrome Extension that Steals all Data Posted by Users on any Websites

Chrome Extensions continue to get compromised, security officer Renato Marinho from Morphus Labs identified a malicious Chrome extension that captures data posted by users online on any website. They noticed a phishing campaign titled “Follow the photos from the weekend (via WhatsApp)” which infects users by opening an email with alleged photos. How it affects […]

IoTroop Botnet: The Full Investigation

our researchers discovered a new and massive IoT Botnet, ‘IoTroop’. Due to the urgency of this discovery, we quickly published our initial findings in order to alert the cyber security community. Since then, we have had time to digest and dissect the propagating malware and share our findings with you. The main findings are: • The entire […]

EternalRomance NSA Exploit a Key Player in Bad Rabbit Ransomware Mayhem

Two days back we reported about the havoc caused by Bad Rabbit ransomware throughout Europe but mainly in Ukraine and Russia. It has been two days, but security experts are still unable to identify how Bad Rabbit is compromising devices at such a massive scale. Initially, it was believed that a customized scanning mechanism which […]

Kaspersky says NSA hacking tools obtained after malware was found

Apparently, a pirate download of Microsoft Office could be the root of all the trouble. Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was lifted from a PC for analysis but insists the theft was not intentional. In October, a report from The Wall Street Journal claimed that in 2015, the Russian firm targeted […]

Exclusive – CSE ZLab experts spotted a new Wonder botnet in the wild

The CSE CybSec Z-Lab Malware Lab spotted a new botnet, dubbed Wonder botnet, while it was investigating malicious code in the dark web. While investigating the malicious code in the dark web, ZLab experts discovered a “NetflixAccountGenerator.exe” that promises to generate a premium account for Netflix services for free. Unfortunately, the software downloaded does not work […]

Microsoft’ New Feature to Protect Windows 10 from Ransomware

Since ransomware are quite common nowadays, and no device is spared from the malicious objectives of cybercriminals, therefore, security firms and tech giants are trying to provide some reliable solutions to users. It is a fact that just by installing anti-virus software it is not possible to properly secure your computer through becoming a victim […]