Browsing tag

malware

GhostCtrl Android Malware Records Audio, Video and Spies on Users

Perhaps it is not so surprising to see powerful malware now being created to target Android devices. Researchers at Trend Micro recently discovered yet another malicious software that infects Android devices and ends up stealing pretty much anything for the attacker. GhstCtrl The new malware goes by the name of GhostCtrl (a variant of OmniRAT) […]

You can buy password stealing malware ‘Ovidiy Stealer’ for $7

Researchers at Proofpoint recently discovered a mass-marketed malware called Ovidiy stealer whose main purpose is to steal passwords from victims. It is the first of its kind as it is being sold online at a low price which is between $7 to $13. A simple yet threatening malware It is not common to hear malware […]

Gandi hosting’ logins breached; 751 domains diverted to malware site

Gandi SAS, a French web hosting company has announced that it suffered a security breach after hackers got hold of the valid login details to one of the company’s technical providers who manage a number of geographic TLDs. The hackers were then able to divert traffic for over 751 domains to a malicious website. Gandi had issued an […]

OSX/Dok malware hits Macs; bypasses Apple’ Gatekeeper

IT security researchers at Checkpoint recently discovered that a new malware has started to rise and is targeting Mac devices. The malware is considered quite powerful as it can bypass Apple’s gatekeeper and effectively steal users’ credentials. Apple rushing to revoke compromised certificates It is relatively rare to hear news about Mac devices getting compromised […]

Highrise: How This CIA Malware Spies And Steals User Data Using SMS

Short Bytes: The latest WikiLeaks Vault 7 leak deals with an Android malware that doesn’t need the internet to talk to the CIA servers and spy on the users. Named Highrise, this malware acts as an SMS proxy to send stolen data. Highrise works on Android version 4.0-4.3; it’s installed under the name TideCheck.  Last week, we wrote […]

New PoS Malware LockPoS emerges in the threat landscape

A newly discovered Point of Sale (PoS) malware dubbed LockPoS appeared in the wild and it is being delivered through the Flokibot botnet. A newly discovered Point of Sale (PoS) malware is being delivered via a dropper that is manually loaded and executed on the targeted systems, Arbor Networks Security researchers warn. Arbor Networks researchers discovered a new Point […]

CIA Highrise Android Malware Spies On SMS Messages: WikiLeaks

WikiLeaks is back with yet another batch of Vault 7 related documents detailing the CIA’s (Central Intelligence Agency) hacking tools and programs targeting unsuspected users worldwide for large-scale cyber espionage. The latest leak exposes “Highrise,” a malware disguised as an app called TideCheck employed by CIA to target Android devices running on versions 4.0 and 4.3 – WikiLeaks has described the app as […]

Cross-platform Remote Access Trojan “Adwind” Steal Credentials, Record and Harvest keystrokes the Aerospace Industries Data

Remote Access Trojan(RAT) Called “Adwind”(Adwind/jRAT)  Targeting Aerospace Industries to steal credentials, record and harvest keystrokes, take pictures or screenshots, film and retrieve videos, and exfiltrate data. Its a Cross Platform Remote Access Trojan which Detect as JAVA_ADWIND and Malware Authors developed this Malware to run on any machine installed with Java, including Windows, Mac OSX, […]

Avanti Markets’ kiosks hacked; credit card, biometric data stolen

The self-service kiosks of Avanti Markets were recently hacked with criminals stealing customer information which included credit card numbers, the first and last name of the customers along with certain biometric information. Avanti Markets Avanti Markets is one of the largest suppliers of self-service kiosks that are used by corporate employees to pay for snacks […]

How SpyDealer Malware Hacks Your Facebook, WhatsApp, Web Browser, And Other Android Apps

Short Bytes: The security researchers have identified a malware named SpyDealer, which affects Android smartphones running Android versions between 4.4 KitKat and 2.2 Froyo. SpyDealer abuses a popular rooting app to gain root permissions. After that, the malware gets the power to exfiltrate private data from more than 40 apps, including Facebook, WhatsApp, etc. A few days […]

Brilliant Phishing Attack Targeting Critical Infrastructure and Manufacturing Industries

Nowadays attackers targeting users more innovatively through Emails and many other ways. This malware attack particularly targeting power sectors including Nuclear power stations. Attackers used Malicious Word documents in this attack with a different behavior this time. This attack was identified by Talos intelligence. There is no malicious code with attachment itself instead of it download file […]

How the CopyCat malware infected Android devices around the world

Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months. The malware, dubbed CopyCat by Check Point mobile threat researchers, uses a novel technique to generate and steal ad […]

CIA Malware Can Steal SSH Credentials, Session Traffic

WikiLeaks dumped today the documentation of two CIA hacking tools codenamed BothanSpy and Gyrfalcon, both designed to steal SSH credentials from Windows and Linux systems, respectively. Both tools are “implants,” a term the CIA uses to describe malware payloads. Once installed through various means on a target’s computer, these two implants hook into SSH-related processes […]

Two hackers arrested after a decade of selling malware

Ruslan Bondars and Jurijs Martisevs were identified as the main culprits behind a crime in which they were selling malware over the dark web. The malware sold was meant to disrupt many U.S businesses. The indictment According to an indictment released by the Federal court in Alexandria, Virginia, the two men were selling malicious software […]

Computer Servers Of Software Firm Linked To Petya Malware Attack Seized By The Police

Short Bytes: In the wake of recent Petya/NotPetya attack, to prevent the further cyber attacks, Ukraine’s Cyber Police has seized the servers of the software firm that makes M.E.Doc accounting software. The police suspects that hackers used a backdoor in software to install malicious code and the initial infection was spread via a software update. Meanwhile, […]

Servers associated with NotPetya attack seized by Ukrainian Police

Last week the computer systems of several companies in Europe were infected with NotPetya malware. At first, the researcher thought it’s just another ransomware attack like the WannaCry one but later discovered that NotPetya is a disk wiper that locks a victim’s data files and throws away the decryption key. Now, Police in Ukraine has […]

What Happens When Your PC Is Hit With Petya/NotPetya? — Watch Here

Short Bytes: Petya wiper is a dangerous malware that has disguised itself as a ransomware to get the attention of media. After infecting a computer and waiting for 10-60 minutes, Petya reboots a computer and starts encryption process. The whole process has been documented in the form of a video by YouTuber danooct1. Ransomware is one […]

Wikileaks Exposes CIA’ Linux Hacking, Geolocation Tracker Malware

As you may know, WikiLeakes has been releasing sensitive documentation associated with CIA’s hacking tools as part of its Vault 7 series. This time round, the whistleblowing website made public documentation related to two hacking tools called OutlawCountry and Elsa. OutlawCountry OutlawCountry is a tool that allows CIA to hack into Linux-based systems and perform […]

Microsoft to use AI in Windows 10 to counter malware attacks

Microsoft’s Windows operating system seems to have been having a really bad year given the major cyber attacks taking place including the WannaCry incident and the most recently discovered Petya campaign. As a result, Microsoft has responded with a new and improved anti-virus software that is integrated with Artificial Intelligence (AI) capabilities designed to detect […]

Petya not a ransomware but much worse

The breakout of the Petya malware two days ago has caused mayhem once again. It has been the second major global cyber attack after the WannaCry incident. However, the latest research reveals that the ransomware is not a ransomware at all. Background Petya was discovered two days ago and has its root in Ukraine. The […]