Browsing tag

malware

OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive

OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments, activists, and dissidents connected to Vietnam. Palo Alto Networks’ Unit 42 division researchers observed a new custom malware family dubbed “KerrDown” used by the threat actor group since 2018. This ongoing campaign primarily […]

Did Apple Really Ban Facebook and Google’s Apps? Why?

As reported in TechCrunch Google and Facebook have been violating Apple’s policies, using apps that tracked user behavior outside Apple’s App Store. Apple temporarily banned Facebook and Google from running internal software, sending a strong message. Facebook Tracked Users Facebook likes to know more about its users and what the users do both on and […]

Top 10 Best Antivirus software for 2019

Open the Internet and your screen will be flooded with hacking news and exploits carried out through the use of sophisticated techniques. It is not uncommon to land on news reports of millions of compromised Internet devices. These stories emerge not merely because of the hacker’s expertise, although this plays a large part. Just as crucial is the lack […]

Cryptojacking Malware Hits 8 Australian Webhosting Companies

Monero mining malware is in full swing now, as eight Australian companies reported that they were compromised with malware. The cybercriminals were able to monetize their Monero mining malware to the tune of $3900 worth of Monero coins. The mining activities have been active since May 2018, and it took the companies to disclose the […]

APT39 Iranian Cyber Espionage Team, Active In The Wild Again

The infamous APT39, the alleged Iran-funded cyber espionage team has been identified by FireEye as actively targeting Europe, USA, Australia, South Korea and the Middle East region for their espionage campaign. “APT39 marks the fourth Iranian cyber threat actor that FireEye has elevated to the designation Advanced Persistent Threat (APT). APT39’s focus on personal information […]

A new malware using Google App Engine to create malicious PDF files

Cobalt Strike malicious hackers group is abusing Google App Engine to distribute malware embedded in PDF documents Network security and ethical hacking specialists from the International Institute of Cyber Security reported the emergence of a complex campaign of malware attacks in which hackers exploit Google App Engine, a cloud computing platform, to deploy malware using […]

Hackers used Karma tool to hack iPhones of prominent Govt officials

UAE Launched Aggressive Cyber Espionage Campaign using KARMA and Expertise of Ex-NSA Operatives. Though it seems hard to believe it is indeed true that the smartphones of several prominent political and governmental personalities worldwide have been hacked by former US intelligence officers who now work for the UAE (United Arab Emirates) government. Prominent figures targeted […]

How to Ensure Protection Against ATM Jackpotting

Of late, cybercriminals have been showing an increasing trend to target ATMs, all across the world. They employ different methods to target ATMs, most of which are potentially good targets owing to the high volume of cash available plus the low security. ATM jackpotting is one of the popular methods that cybercriminals employ to attack […]

Selfie stealing malware found in popular Android beauty camera apps

We all want to look perfect in the pictures that we post online and beauty camera apps are our best bet in order to fine-tune our pictures. However, according to the findings of Trend Micro researchers, these kinds of applications are performing more functions than what we think they are. Reportedly, some of the Android […]

APT39 Hacking Group Launch Widespread Attack Focused on Personal Information

Iranian cyber espionage group APT39 focus on stealing on personal information o perform monitoring, tracking, or surveillance operations against specific individuals. The group carrying a widespread campaign focused their operations in the Middle East, the U.S. and South Korea. Following are the industries targeted including telecommunications, travel industries, high-tech industry, and government entities. “We have […]

FORMBOOK Malware Delivered via Weaponized RTF Word Docs – Using CVE-2017-11882

Formbook campaign with what looks like a few changes. Recently the criminals distributing this malware have been using .exe files inside various forms of an archive, including .iso, .ace, .rar. , zip. Frequently they use various Microsoft Office Equation Editor exploits to contact a remote site & download the payload. Very occasionally I have seen […]

Malware Attack Using Google Cloud Computing Platform

Hackers have unleashed a global malware campaign using the Google cloud computing platform via weaponized PDF. Security researchers at the Netskope Threat Research Labs have detected this malware attack, which mostly targeted the banking and finance sector. Government firms too have been targeted worldwide. A recent Netskope blog post authored by Ashwin Vamshi states, “Netskope […]

Hackers Using Google Cloud Computing Platform To Deliver Targeted Malware Attacks via Weaponized PDF

Threat actors using Google computing platform (GCP) to deliver the malware through malicious PDF files. The attack targeting governments and financial firms worldwide. According to Netskope Threat Research Labs detected the targeted based on its 42 customers instances and likely the attacks to be launched by the infamous hacking group Cobalt Strike. Last year Cybercriminals […]

Beware; hackers are using malicious TeamViewer tool to spread malware

TeamViewer is a popular remote control desktop sharing software with more than 1 billion users and that makes it a lucrative target for cyber criminals. Recently, the IT security researchers at Trend Micro have uncovered a malware campaign targeting unsuspecting users with a malicious version of TeamViewer. Note: It is worth mentioning that the official website […]

Redaman Banking Trojan of 2015 Resurrects, Targets Russian Email Users

A 2015-era banking trojan is seen actively spreading in the wild again, this time specifically targeting potential victims from a specific country only. Palo Alto Networks detected massive number of phishing emails containing the Redaman banking trojan targeting emails ending with .ru domain. Formerly known as RTM banking trojan in 2015, the Redaman malware is […]

Hackers abusing Google App Engine to spread PDF malware

The Cobalt Strike advanced persistent threat (APT) group is using Google App Engine to spread PDF malware against financial firms. The IT security researchers at Netskope have discovered a sophisticated malware campaign in which cybercriminals are abusing Google App Engine (GCP), a web framework and cloud computing platform to deliver malware via PDF decoys. According to researchers, the malware campaign is currently […]

New malvertising campaign attacks Apple device users

A well-known hacker group is behind this malicious campaign Network security and ethical hacking specialists from the International Institute of Cyber Security warn about a new malvertising campaign against Apple device users. According to the cybersecurity expert Eliya Stein, the group behind this campaign, called VeryMal, has deployed several campaigns since the middle of last […]

ATTENTION: Torrents downloaded from The Pirate Bay contain a dangerous malware

Malicious hackers have infected some torrents on this platform with a malware functional in Windows operating systems Although in general this practice does not generate major drawbacks, experts in network security and ethical hacking from the International Institute of Cyber Security say that downloading a torrent involves taking some risks, as many of these files […]