Browsing tag

malware

Facebook password stealer; hacking the attacker rather than victim

How to hack a Facebook account is one the most searched keywords over the Internet and there are if not thousands then hundreds of websites claiming to provide Facebook account hacking service. But are these sites doing what they claim? Not at all. According to a Twitter user going by the handle of MalwareHunterTeam, a group […]

WikiLeaks: CIA’ CouchPotato Tool Remotely Collects Video Streams

WikiLeaks has released yet another CIA hacking tool as part of its Vault 7 series documents belonging to the American Central Intelligence Agency (CIA). This time, the whistleblowing platform has leaked the “User Guide for the CoachPotato project” of the agency work of which is to hack and obtain RTSP/H.264 video streams and still images remotely. The project CouchPotato is different from Dumbo […]

Fileless malware that uses PowerShell scripts from Window’s registry leading to Click Fraud Malware Campaign

Nowadays Hackers Distributing Advanced Fileless Malware with Evasion capabilities which are very Difficult to Detect. These types of malware sit in the system registry and making hard for Antivirus hard to identify the infection. The security researchers from Quick Heal Security Labs detected as Fileless malware which uses PowerShell scripts stored in the windows registry. […]

Researchers Encode Physical DNA with Malware To infect Computers

When DNA was synthesized, nobody had thought that it could be used to spread computer viruses, but a group of researchers from the University of Washington’s school of computer science and engineering have come up with a surprising new research. According to the research team, it is indeed possible to insert malicious malware into the […]

North Korea Hit By Konni and Inexsmar Malware After Missile Tests

An unknown hacking group has been targeting organizations in North Korea with Konni Malware. It is a RAT/remote access Trojan having all those features that any effective backdoor might have such as host profiling and remote access control. In 2017, already three different campaigns were identified by security experts against North Korean companies using this […]

Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure

A new research published last week by Willem Westerhof describing an outsized scale cyber attack targeting the crucial electrical infrastructure based on existing outline that he published in ITsec 2016. He titled as Horus scenario which focuses on Cyber attack on PhotoVoltaic-installations and recreating solar energy if an attacker gained control over PV-installations by injecting […]

WannaCry hero gets bail; pleading not guilty over Kronos malware

As you might know, 23-year-old Marcus Hutchins (@MalwareTechBlog on Twitter) who once made the news for stopping WannaCry ransomware attack was arrested by the FBI in Las Vagas while he was attending the BlackHat and DefCon hackers conferences.  The bureau charged him with developing and distributing Kronos banking malware and stealing banking details of the user in the […]

Hacker Sentenced More Than 3 Years Jail For Spreading Linux Malware

A Russian man accused of infecting tens of thousands of servers through Linux malware around the world to generate millions of dollars in fraudulent payments was imprisoned for 46 months (almost four years) in a federal prison in the United States. Maxim Senakh, 41, from Velikiy Novgorod, was arrested by the Finnish police in August […]

Hero Researcher Who Halted WannaCry Ransomware Arrested by FBI

An IT security researcher going by the Twitter handle of @MalwareTechBlog (real name Marcus Hutchins) has been detained by the law enforcement authorities in the United States. Hutchins, who is visiting States to attend Defcon, one of the world’s largest hacker conventions in Las Vegas, Nevada was arrested for unknown reasons Hutchins is the researcher who “saved” the world […]

Vault 7: CIA’ Dumbo Project Hijacking Webcams and Microphones

The Vault7 saga is far from over, and every passing week we are being introduced to a new set of tricks and tools that were allegedly used by the CIA for invading the privacy of security systems. CIA’s Dumbo Project is a system designed to manipulate Microphones, webcams and similar other devices installed on Microsoft […]

Banking Trojan Inspired By Wannacry To Add Self Spreading Ability

Even though WannaCry and Petya ransomware wave have slowed down, motivated by money laundering criminals, and hackers have taken world class outbreaks for their most powerful Banking Trojan. Security researchers have discovered at least one group of cyber criminals who are trying to give your banking Trojan self-spread worm capabilities that have made the recent […]

Dangerous Mobile Banking Trojan Uses Keylogger To Steal Everything

Security researchers have discovered that one of Android’s most dangerous Mobile banking Trojan family has been modified to add a keylogger for its recent stump, giving attackers another way to steal sensitive information to victims. Kaspersky Lab’s old malware analyst Roman Unuchek has discovered a new variant of the famous Android trojan, called Svpeng, in […]

ShieldFS Stops Ransomware Attacks With 97% Success And Recovers Your Lost Files

Short Bytes: A team of Italian security researchers has created a Windows filesystem add-on named ShieldFS to fight the ransomware attacks. By using techniques like shadowing and copy-on-write, ShieldFS makes sure that an attack is timely stopped and its backup is restored. In the tests, the add-on was able to detect the malware on 97% occasions. The […]

Machine learning system to create invisible malwares – gym-malware

In the recent DEF CON Meet, technical director of security shop Endgame Hyrum Anderson disclosed a research paper on adapting API frameworks in building a malware that AV engines cannot identify. The core function of the system is to build a legitimate looking app by making minor changes to the original app that can avoid […]

Pre-installed Trojan in Cheap Android Devices Steal Data, Intercept Chats

Android devices are one of the most vulnerable mobile OS (operating systems) due to its open source nature. But what would a user do if their device is delivered to them with a pre-installed malware? Well, Let’s talk about that. IT security researchers at Dr. Web, a Russian cyber security firm has discovered that a number […]

Healthcare Clinic Suffers Ransomware Attack; 300K Patients Impacted

This without a doubt is the second largest health data breach caused by a ransomware attack. An Oaks, Philadelphia based women’s healthcare clinic ‘Women’s Health Care Group of PA’ (WHCGPA) was reportedly attacked with ransomware. On July 18, a security notice was posted by the clinic that revealed details about the attack. As per the […]

How A Coffee Machine Infected Factory Computers with Ransomware

It’s no surprise that the Internet of Things (IoT) devices are highly vulnerable to cyber attacks but who would know a time would come when these devices will become a security threat to institutions? This case involves a coffee machine and a ransomware attack. A few months ago researchers exposed life-threatening vulnerabilities in IIoT (Industrial Internet […]

SSL/TLS Client Fingerprinting for Malware Detection

A JA3 hash represents the fingerprint of an SSL/TLS client application as detected via a network sensor or device, such as Bro or Suricata. This allows for simple and effective detection of client applications such as Chrome running on OSX (JA3=94c485bca29d5392be53f2b8cf7f4304) or the Dyre malware family running on Windows (JA3=b386946a5a44d1ddcc843bc75336dfce) or Metasploit’s Meterpreter running on […]

China arrests 11 hackers for infecting 250M devices with Fireball malware

Law enforcement authorities in China have arrested eleven hackers suspected of developing Fireball malware which infected 250 million computers worldwide. Among the infected devices, 20 percent belonged to large corporate networks in various countries. Fireball malware was discovered two months ago by researchers at Proofpoint who noted that its mission is to infect computers in an […]

6 billion records hacked in 2017 so far; ransomware victims paid $25 million

With every passing day, hackers and cyber criminals are becoming more sophisticated in their attacks. Resultantly, they are getting their hands on highly critical and sensitive data from almost every institution around the world. According to a mid-year report by Risk Based Security (RBS), a Richmond Virginia based company who keeps an eye on data breaches, […]

CowerSnail Backdoor Targeting Windows Devices

Kaspersky Lab has identified the presence of a backdoor designed primarily for attacking Windows systems. When the backdoor successfully infects the system the malware automatically enhances its process priorities and creates a connection to the C&C server using the IRC protocol. After collecting system information, it sends it to the C&C domain and exchanges pings […]