How hackers used this Trojan malware to spy on a territorial dispute
F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used targeted malware to steal data from some of...
View ArticleKazakhstan Government Uses Malware to Spy on Journalists and Political Activists
EFF exposes threat group operating for Kazakhstan regime. The Electronic Frontier Foundation (EFF) has released a report today named Operation Manul that details attacks with malware on Kazakhstan’s...
View ArticleBackdoor.Remvio: Highly customizable remote access Trojan sold online
The new Trojan can be used to steal information and passwords from compromised computers. Symantec recently noticed that an Italian malware author called z3r0 is selling a new remote access Trojan in...
View ArticleHackers Make the First-Ever Ransomware for Smart Thermostats
One day, your thermostat will get hacked by some cybercriminal hundreds of milesaway who will lock it with malware and demand a ransom to get it back to normal, leaving you literally in the cold until...
View ArticleHow Robot Malware Brains Work
Advances in software application development designed to protect us against malware evolve positively forward every day, yet the threat of cybercrime continues. But if we understand how ‘malware...
View ArticleDevelopment version of the Hitler-Ransomware Discovered
It looks like file deletion is becoming a standard tactic in new ransomware applications created by less skilled ransomware developers. This is shown in a new ransomware called Hitler-Ransomware, or...
View ArticleOracle-owned point-of-sale service suffers from malware attack
A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp., KrebsOnSecurity has learned. More...
View ArticleResearchers crack open unusually advanced malware that hid for 5 years
Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in its design and execution that it could...
View ArticleNemucod is back and serving an ad-clicking backdoor instead of ransomware
The trojan downloader Nemucod is back with a new campaign. This time however, it has changed the payload served to its victims – ransomware is not its go-to malware. Currently the “weapon of choice” is...
View ArticleAutomated systems crawl the DarkWeb to find Zero-Days
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence.Can finding zero-day vulnerabilities be as easy as...
View ArticleResearchers Hide Malware Inside Digitally-Signed Files Without Breaking Hashes
New technique makes malware detection almost impossible. A team of security researchers from Deep Instinct have discovered a method of injecting malware inside a digitally-signed binary without...
View ArticleBungling Microsoft singlehandedly proves that golden backdoor keys are a...
Redmond races to revoke Secure Boot debug policy. Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo...
View ArticleLinux bug leaves USA Today, other top sites vulnerable to serious hijacking...
“Off-path” attack means hackers can be anywhere with no man-in-the-middle needed. Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections...
View ArticleCryptFile2 Ransomware Returns in High Volume URL Campaigns
Proofpoint researchers originally discovered the CryptFIle2 ransomware in March [1]. At the time, it was spreading via exploit kits (EKs); however, beginning on August 3, 2016, we detected the first...
View ArticleAn ATM hack and a PIN-pad hack show chip cards aren’t impervious to fraud
The good news? Hacks are limited for now. The bad news? Hackers will get better. Security researchers are eager to poke holes in the chip-embedded credit and debit cards that have arrived in Americans’...
View ArticleNew air-gap jumper covertly transmits data in hard-drive sounds
“DiskFiltration” siphons data even when computers are disconnected from the Internet. Researchers have devised a new way to siphon data out of an infected computer even when it has been physically...
View ArticleNew Information Stealing Trojan Steals and Uploads Corporate Files
Corporate cybercrime and information theft has become a very lucrative business for malware developers. Not only does it allow them to steal corporate secrets to sell to the highest bidder, but it can...
View ArticleNew Scylex Banking Trojan Kit Surfaces on the Dark Web
Scylex – “the next big thing” in terms of banking trojan. Threat-intel experts from Heimdal Security and the CSIS Security Group have uncovered a new banking trojan called Scylex, currently advertised...
View ArticleRoad Warriors: Beware of ‘Video Jacking’
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — like a TV. However, new research shows...
View ArticlePokemonGo Ransomware installs Backdoor Account and Spreads to other Drives
With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered by Michael...
View Article