Advertisement
Top

Tag: Malicious


Malware

Large Botnet Comes Back To Life — With More Malware

June 24, 2016

Via: Dark Reading

The Necurs botnet associated with Dridex and Locky is back after three-week haitus. A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent months has resumed operations after mysteriously going dark for three weeks. Researchers from […]


Malware, Mobile security

Malware uses Google Talk to make malicious phone calls

June 21, 2016

Via: Malwarebytes

We found a new piece of mobile malware, Android/Trojan.Pawost, that’s using Google Talk to make malicious calls. As soon as the malicious app is opened, a blank Google Talk icon pops up in the notifications of the mobile device. As […]


Malware

Malvertising Campaign Leads To DoubleClick Ad Fraud

June 7, 2016

Via: Malwarebytes

Malvertising isn’t only used to infect users via drive-by downloads or to deceitfully push fake software updates. A campaign currently going on via the TrafficHolder adult ad platform leverages the promise of raunchy videos to lure people into ad fraud. […]


Malware, Virus & Malware

“Zcrypt” – the ransomware that’s also a computer virus

June 2, 2016

Via: Naked Security

SophosLabs just pointed out to us a new piece of ransomware with an interesting twist. It’s a virus! Most malware samples these days are what’s known as Trojans, short for “Trojan Horses” – programs that seem harmless on the surface, […]


Editorial

Protect your company from the risks of metadata shadows

May 11, 2016

Via: Russel Edwards

Metadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user […]


Malware

Rokku Ransomware shows possible link with Chimera

April 12, 2016

Via: Malwarebytes

Rokku is yet another ransomware, discovered in recent weeks. Currently, it’s most common distribution method is spam where a malicious executable is dropped by a VB script belonging to the e-mail’s attachment. The building blocks of Rokku reminded us of the […]


Network security

Why Botnets Remain the Go-To Weapon for Cybercriminals

March 25, 2016

Via: Security Intelligence

For almost two decades, botnets have plagued our networks. Named by combining the words robot and network, a botnet is a network of computers that are infected with malicious software and remotely controlled by cyber-criminals known as botmasters. This task […]


Cyber-crime, Hacker, Malware

Carbanak cyber-thieves’ newest attacks exposed

March 22, 2016

Via: Help Net Security

The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking advantage of their victim payment processing networks, ATM networks and transaction […]


Editorial, Email security, Phishing

How to escape the BEC scam – when authority emails equal fraud

March 16, 2016

Via: Russel Edwards

Lately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are […]


Vulnerabilities

Hacking Internet-connected trucks and buses

March 10, 2016

Via: Help Net Security

Among the things one can find with Shodan, the search engine for the Internet of Things, are trucks, buses and delivery vans that have been equipped with the Telematics Gateway Unit (TGU) device and a modem to connect to the […]


Phishing

Snapchat caught in phishing campaign

March 1, 2016

Via: Kaspersky Blog

We talk a lot about phishing and how dangerous it is. At times we feel like we may talk about it too much to where people simply say, “yeah, yeah. That will never happen to me, I am too smart […]


Cyber warfare, Cyber-crime

Deep and Dark Web: Complexity and escalating cybercriminal activity

February 22, 2016

Via: Help Net Security

Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cyber-crime over the past year. In the report, researchers highlight prolific trends that pose the greatest risk to organizations and […]


Phishing

Fake Amazon Mail Phishes for Login, Payment Information

February 5, 2016

Via: Malwarebytes

From the mailbox: a fake Amazon mail which attempts to persuade the lucky recipient that they have the chance to win £10 in return for completing a quick survey. The mail, titled “ΙD: 569369943” and claiming to be from “members support” / message@notice-amazon(dot)com, reads […]


Malware

Nuclear EK Leveraged In Large WordPress Compromise Campaign

February 4, 2016

Via: Malwarebytes

Security company Sucuri recently noted a spike in WordPress infections, with a large number of sites getting injected with the same malicious scripts. Hacked websites are often used to host spam or perform malicious redirections to exploit kits and this case is […]


Vulnerabilities

eBay Vulnerability Exposes Users to Phishing, Data Theft

February 3, 2016

Via: Threat Post

Researchers are warning that some visitors to eBay.com could be tricked into opening a page on the site that could expose them to phishing attacks and data theft. The vulnerability exists in the site’s online sales platform, according to Roman […]


Mobile security

Beware of an iPhone-crashing link being passed around on Twitter

January 26, 2016

Via: CIO

You already know not to click or tap on suspicious-looking links, but URL shorteners are making that a little more complicated today. Twitter users are passing around a shortened link that directs your browser to CrashSafari.com, a site that does […]


Malware

When URL Shorteners and Ransomware Collide

January 14, 2016

Via: Malwarebytes

We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are […]


Hacker

Exposed: New toolset of the Sofacy cyber-espionage group

December 7, 2015

Via: Help Net Security

Kaspersky Lab has spotted new attacks by the Sofacy group which make use of several upgraded techniques designed for aggressive persistency and greater invisibility of malicious activity in the attacked system. Sofacy (also known as “Fancy Bear,” “Sednit,” “STRONTIUM” and […]


Malware

Malware Crypters – the Deceptive First Layer

December 4, 2015

Via: Malwarebytes

Recently, two suspects were arrested for selling Cryptex Reborn and other FUD tools (helping to install malware in a Fully UnDetectable way). Today, we will study some examples to make sure that everyone knows what this type of tools are and […]


Data loss, Malware

Hilton Acknowledges Credit Card Breach

November 25, 2015

Via: Krebs on Security

Two months after KrebsOnSecurity first reported that multiple banks suspected a credit card breach at Hilton Hotel properties across the country, Hilton has acknowledged an intrusion involving malicious software found on some point-of-sale systems. According to a statement released after markets closed […]