Browsing tag

malware

What Happens When Your PC Is Hit With Petya/NotPetya? — Watch Here

Short Bytes: Petya wiper is a dangerous malware that has disguised itself as a ransomware to get the attention of media. After infecting a computer and waiting for 10-60 minutes, Petya reboots a computer and starts encryption process. The whole process has been documented in the form of a video by YouTuber danooct1. Ransomware is one […]

Wikileaks Exposes CIA’ Linux Hacking, Geolocation Tracker Malware

As you may know, WikiLeakes has been releasing sensitive documentation associated with CIA’s hacking tools as part of its Vault 7 series. This time round, the whistleblowing website made public documentation related to two hacking tools called OutlawCountry and Elsa. OutlawCountry OutlawCountry is a tool that allows CIA to hack into Linux-based systems and perform […]

Microsoft to use AI in Windows 10 to counter malware attacks

Microsoft’s Windows operating system seems to have been having a really bad year given the major cyber attacks taking place including the WannaCry incident and the most recently discovered Petya campaign. As a result, Microsoft has responded with a new and improved anti-virus software that is integrated with Artificial Intelligence (AI) capabilities designed to detect […]

Petya not a ransomware but much worse

The breakout of the Petya malware two days ago has caused mayhem once again. It has been the second major global cyber attack after the WannaCry incident. However, the latest research reveals that the ransomware is not a ransomware at all. Background Petya was discovered two days ago and has its root in Ukraine. The […]

Linux PC Can Be Hacked Remotely With Malicious DNS Response

A critical loophole has been discovered in SystemD, the popular first character system and service manager for Linux operating systems, which can allow remote attackers to tolerate a buffer overflow to run malicious code on their choice through DNS response machines. Thus, Linux PC can be hacked remotely with malicious DNS response. The vulnerability, called CVE-2017-9445, […]

Vault 7: CIA Malware for Tracking Windows Devices via WiFi Networks

Today, WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of WiFi-capable Windows devices based on the ESS (Extended Service Set) data of nearby WiFi networks. According to the tool’s 42-page manual, the tool’s name is ELSA. The manual includes the following image to explain to CIA operatives how the […]

Massive Goldeneye Ransomware Attack Hits Users Worldwide

Computer systems around the world have been hit with a new ransomware malware called Goldeneye, a variant of Petya ransomware. Its targets are governments and businesses; infecting computers and files to lock out users and demanding $300 in Bitcoin to regain access. Upon infecting a system the malware forces the targeted computer to restart so the […]

Brutal Kangaroo: How CIA Hacked Offline Computers Using Infected USB Drives

Short Bytes: Brutal Kangaroo malware is the latest addition to the ongoing WikiLeaks Vault 7 leaks. Published earlier this week, the leaked documents show how the CIA hacked offline and air-gapped computers using USB drives. Brutal Kangaroo is basically a combination of 4 tools which work together. The malware used Windows operating system vulnerabilities to targeted air-gapped computers. […]

Fake Pornography App Infecting Devices with Android Ransomware

Lukas Stefanko, a researcher at ESET security, recently discovered a ransomware that goes by the name of Koler to be affecting Android users based in the US through adult-themed websites and a fake PornHub app. Not a new threat The ransomware is not new, and according to BleepingComputer, it appeared on the scene in 2014. This […]

CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

Wikileaks Revealed Next CIA Hacking Tool called “Brutal Kangaroo” under Vault 7 Projects that Consists of 4 Powerful Malware Components which targets closed networks by air gap jumping using thumbdrives. WiliLeaks Vault 7 Project Revealed Few days Before CIA Cyber weapon CherryBlossom which is Specially Developed to compromise the Wireless Network Devices including wireless routers and access […]

Microsoft: Fireball Malware Isn’t As Dangerous As WannaCry; Here’s How To Stay Safe

Short Bytes: Microsoft has released some details on the Fireball malware, which was initially reported by Check Point researchers. Microsoft has pointed out that malware’s magnitude of the threat has been overblown. The company has also listed some precautionary methods to help the customers ensure their security. Earlier this month, the security researchers Check Point Threat Intelligence discovered […]

Honda hit by WannaCry ransomware attack; shuts down plant

The WannaCry incident is indeed going to be remembered in history as one of the most devastating and dreadful ransomware attacks. Not only did it affect the victims shortly after its release, but its self-spreading mechanism is still causing havoc. In the latest report, it has been revealed the ransomware has attacked a Honda plant […]

QakBot/Pinkslipbot: This Malware Remains Active Even After Being Deleted From PC

Short Bytes: The security researchers from McAfee have detected a banking trojan that infects home and enterprise computers using universal plug and play (UPnP) for opening ports. Pinkslipbot, also called QakBot, continues to use infected machines as its control server even after it’s removed. It’s, probably, the first malware that uses HTTPS-based control servers. McAfee has also […]

Erebus Ransomware: Hosting Firm Pays Hackers $1m Ransom

Almost four days ago, HackRead reported that a new version of ransomware called Erebus has affected more than 153-Linux based networks and has targeted one South Korean web hosting company, NAYANA in particular. The ransomware caused a massive data infiltration whereby various multimedia files, databases, and other critical network-level information were encrypted. The attackers demanded a […]

Your anti-virus may remove this malware but it will still remain active

In 2007, IT security researchers at McAfee Labs discovered a malware called Pinkslipbot or Qakbot/QBot targeting banking users in the United States. Now, researchers have noticed that since 2016, a new variant of this malware (also known as Pinkslipbot) with its credential stealing and keylogging capabilities has been using millions of computers as its control servers even if its binaries were […]

4 School Districts in Florida Attacked By Moroccan Hackers

A group of hackers from Morocco allegedly tried to hack the US voting systems. In an attempt, they hacked four school districts from Florida. According to reports, several hacking attempts were said to be made on the US voting system and culprits were mostly believed to be from Russia. However, it seems that another group […]

Google is having a hard time getting rid of malicious Android apps

The IT security researchers at SophosLabs have discovered that Google Play Store currently has as many as 47 apps that contain adware and are being downloaded at an alarmingly fast pace – This is quite troubling as the adware contained in these apps is quite persistent and does not seem to go away no matter […]

Hundreds of Malicious Android Apps Masked as Anti-virus Software

With the recent surge in ransomware attacks, it is no surprise to see that attackers have capitalized on the opportunity and played on people’s fears by offering them Android anti-virus apps that are, in reality, another malware. The hunt for anti-virus apps It goes without saying then, that given the dangers and prevalence of ransomware, […]

Erebus Ransomware Targets Linux Servers

The IT security researchers at Trend Micro recently discovered malware that has the potential to infect Linux-based servers. The malware, called Erebus, has been responsible for hijacking 153 Linux-based networks of a South Korean web-hosting company called NAYANA. NAYANA’s clients affected Erebus is a ransomware capable of infecting Linux operating systems. As such, around 3,400 […]