Top

Category: Malware


Malware, Vulnerabilities

Osiris Banking Trojan Displays Modern Malware Innovation

September 13, 2018

Via: Threat Post

Osiris’ fundamental makeup positions it in the fore of malware trends, despite being based on old source code that’s been knocking around for years. After staying dormant for few years, the Kronos banking trojan resurfaced in July in a form […]


Malware

PowerShell Obfuscation Ups the Ante on Antivirus

September 13, 2018

Via: Threat Post

The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods. A new obfuscation technique has been spotted that uses the features of PowerShell, a tool that comes built […]


Cyber-crime, Malware

Card skimming malware found on thousands of Magento-based sites

September 5, 2018

Via: Help Net Security

A card skimming operation has compromised 7339 Magento-based online stores, allowing the attackers to quietly slurp payment card info as it’s being entered by customers. Flagged in early August by Peeter Marvet (in Estonian) and then by security researcher Willem […]


Cyber-crime, Malware

Ransomware is a big problem, but it’s also a big opportunity for MSPs to educate clients

September 4, 2018

Via: Help Net Security

While large-scale attacks such as WannaCry make headlines, ransomware attacks are just as likely to happen among small businesses as they are large enterprises. According to Datto’s 2017 Ransomware Report, an estimated five percent of SMBs globally fell victim to […]


Cyber-crime, Malware

Reversing malware in a custom format: Hidden Bee elements

August 30, 2018

Via: Malwarebytes

Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can also be achieved by position-independent code—so-called shellcode. But when it comes to more complex elements or core modules, we […]


Cyber-crime, Malware

Attackers abuse WMIC to download malicious files

August 30, 2018

Via: Symantec Connect

We recently observed malware authors using a combination of a tool found on all Windows computers and a usually innocuous file type associated with modifying and rendering XML documents. While these two things—the Windows Management Instrumentation Command-line (WMIC) utility and […]


Cyber-crime, Malware

Cryptojacking attacks spiked in first half of 2018, report

August 29, 2018

Via: CSO Online

Cryptojacking attacks have skyrocketed, locking in cryptojacking attempts as having the biggest security impact in the first half of 2018. So far this year, there has been a 141 percent increase in cryptocurrency mining detections compared to the previous half […]


Cyber-crime, Malware

ThreatList: Ransomware Attacks Down, Fileless Malware Up in 2018

August 28, 2018

Via: Threat Post

The use of fileless malware in attacks continues to grow and now represents 42 out of 1,000 endpoint attacks, according to an analysis of 2018 data by one security firm. The uptick represents a 94 percent increase in the use […]


Cyber-crime, Malware

Cryptocurrency-stealing Trojan raises new concerns on the Mac malware front

August 24, 2018

Via: TechRadar

Mac users have another potential worry on the security front, with the news that Lazarus, a notorious bunch of hackers from North Korea, has adapted its cryptocurrency-stealing malware to target macOS. As spotted by Computerworld, security firm Kaspersky’s researchers uncovered […]


Malware

How to Leverage Log Services to Analyze C&C Traffic

August 20, 2018

Via: Security Intelligence

Command-and-control (C&C) servers are the machines attackers use to maintain communication with the compromised systems in a target network. These servers issue commands to the compromised systems, ranging from a simple “Are you (still) there?” request to data exfiltration instructions […]