Browsing tag

malware

Hacker found using Twitter memes to spread malware

Last year a shocking report revealed how Russian hackers were found spreading malware through Britney Spears’s Instagram posts. Now, the IT security researchers at Trend Micro have discovered a sophisticated campaign in which an unknown hacker is using memes on the social networking service Twitter, to spread malware. According to Trend Micro’s report released on Monday […]

Beware of Destructive Malware Shamoon V3 that Targets Oil and Gas Industry

A new version of the destructive malware dubbed Shamoon V3 targeting European oil and gas company in Middle East and Asia. Shamoon malware was first identified in the year 2012, it targeted Saudi Arabia’s oil company internal network. Securitu researchers form Anomali Labs identified a new sample of the destructive malware Shamoon V3 that contains […]

Hackers Using Weaponized Memes to Communicate with Malware for Malicious Operations

Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations. Memes are nowadays using for fast communication methods to spreading news which is now abused by cyber criminals to reach victims in a very effective way. Attackers using Steganography to embed the malicious payload inside of […]

Sharpshooter: Cyberattack campaign against critical infrastructure in U.S. and Latin America

Experts have discovered a cyberattack campaign against dozens of organizations dedicated to the defense and other critical tasks Digital forensics specialists from the International Institute of Cyber Security reported the emergence of a hacking campaign targeting critical infrastructure companies around the world. The hackers behind this campaign, known as Operation Sharpshooter, are deploying malware associated […]

IT consultancy firm caught running ransomware decryption scam

Ransomware has become a persistent threat to users globally but for cybercriminals, it is a lucrative business. Recently, IT security researchers at Check Point unearthed a sophisticated ransomware decryption scam in which a Russian IT consultant company has been caught scamming ransomware victims. The company according to Check Point researchers calls itself ‘Dr. Shifro’ and claims to provide […]

Nasty Android malware found stealing its victims’ PayPal funds

Another day, another Android malware – This time, according to the latest findings of ESET’s IT security researchers, there is a new malware in Google Play Store that hijacks PayPal account to steal money – Researchers assessed that the malware is specifically targeting Android users and steals no less than $1,000. The malware was first […]

TA505 Cyber Threat Actors Installing Remote Monitoring Tool via Weaponized MS Word Document

Cyber Criminals from TA505 group started a new campaign that targeting retail, grocery, and restaurant chains by distributing weaponized MS word documents. TA505 group already had a record of distributing biggest threat campaign  Dridex and widely distributing Locky ransomware that affected millions of computers around the world. Currently distributed tens of thousands of messages to various country […]

Hackers Steal Over $800,000 By Dropping a Malware On Cod Community College Computer Systems

The Cape Cod Community College suffered a massive cyber attack, the attackers steal college banking information and allegedly transfer $807,130 from College. The attack starts with a phishing email. Cyber Criminals currently targeting various colleges and universities around the worlds through social engineering and malware attack on employees and students. The attacks start with the […]

Domain Hunter – Checks Expired Domains For Categorization/Reputation And Archive.org History To Determine Good Candidates For Phishing And C2 Domain Names

Domain name selection is an important aspect of preparation for penetration tests and especially Red Team engagements. Commonly, domains that were used previously for benign purposes and were properly categorized can be purchased for only a few dollars. Such domains can allow a team to bypass reputation based web filters and network egress restrictions for […]

DanaBot Banking Trojan Evolves Again – Steals Email Address From Victim’s Mailbox

DanaBot Banking Trojan came out with new features which harvest email addresses from the victim’s mailbox and send out spam emails. This Trojan turned out to be the latest example for the malware which focused on stealing useful information rather than demanding ransom from victims. The campaign primarily focuses on corporate and public administration emails. DanaBot […]

22 malware infected apps on Play Store found draining phone’s battery

Another day, another malware targeting Android users – This time, 22 apps have been removed from the Play Store after security researchers found malware draining user phone’s battery and also downloading files without their consent. These Android apps disguised themselves as legitimate software and in some cases even offered some functionality. The most popular of […]

Hackers conducting botnet attacks through 20k hacked WordPress sites

A newly published research from Defiant, a WordPress security firm, reveals that there is a botnet hunting for WordPress sites using over 20,000 already compromised WordPress sites. As the new sites are infected, these automatically become part of the bot army and start acting on the directions of the attackers to perform tasks like brute […]

Windows 10 version 1809 is incompatible with Morphisec anti-malware

Another day, another Windows 10 update issue – This time it includes security software. Another day, another reason for Windows 10 to make headlines for all the wrong reasons. It is a fact that Windows 10 is currently used by over 400 million users globally but lately, its updates have been causing users a great […]

Cyber Attack Prevention Checklist to Keep Your Business Safe & Secure From Hackers

Cyber Security manages business risk during the full cycle(monitor, assess, advise, re-mediate). It fights against the cybercrime: detection of attacks and fraud attempts. It increases security on services platforms, infrastructures, and networks. Here is the Cyber Attack Prevention checklist. There are loads of minimal effort, simple-to-setup methods that can enhance Cyber Security inside the organization. We […]

Malware since 2017: Auction giant Sotheby’s Home hit by Magecart attack

Sotheby’s, an American multinational corporation and Auction House has become another victim of Magecart attack after hackers gained access to Sotheby’s home website and inserted a card-skimming code aiming at customers’ credit card and banking data. Although Sotheby’s detected the intrusion on 10th October 2018 the malware was present on its website and stealing personal and financial data of […]

Moscow’s cable car service shuts down in 2 days after ransomware attack

The first cable-car service was launched in Moscow this Tuesday, and free rides to and from Luzhniki Stadium were promised to the visitors throughout the first month. Naturally, people were eager to ride the cable-car and thronged the location. However, much to their dismay, only after a few days the service got attacked with ransomware. […]

Feds charge 2 Iranian hackers behind SamSam ransomware attacks

The United States Department of Justice has charged two Iranian nationals with allegedly developing and using SamSam ransomware against their targets in the United States and Canada to carry out computer hacking and extortion scheme from Iran. Both Mohammad Mehdi Shah Mansouri, 27 and Faramarz Shahi Savandi, 34 have been charged with six counts together with one count of conspiracy […]

The FBI shuts down a millionaire online fraud campaign

Cybercriminals behind this operation earned about $30M USD The Federal Bureau of Investigation (FBI), Google and multiple cybersecurity and digital forensics firms worked together to collapse one of the most complex digital advertising fraud schemes ever seen, which managed to infect more than 1.7 million computer equipment with the aim of generating fake clicks and […]