“HOMEKit” Exploit Generator Used to Deliver Espionage Malware
Researchers have come across a document exploit generator that has been used over the past few years by several threat actors to deliver malware in cyber espionage campaigns. The toolkit, dubbed...
View ArticleGuy Tricks Windows Tech Support Scammers Into Installing Ransomware Code
Short Bytes: A man named Ivan Kwiatkowski managed to install Locky ransomware on the machine of a person who was pretending to be a tech support executive of a reputed company. Ivan wrote his...
View ArticleStarwood, Marriott, Hyatt, IHG hit by malware: HEI
A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged payment card data from tens of thousands of food, drink and...
View ArticleLinux bug leaves 1.4 billion Android users vulnerable to hijacking attacks
Off-path attack means malicious hackers can be located anywhere on the Internet. An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate...
View ArticleScammy-Looking Shark Project Delivers Fully Working Ransomware
New free ransomware project appears online. Hooray!!! Serbian security researcher GrujaRS shared with Softpedia a ransomware project called Shark, freely distributed on the Deep Web, but which appears...
View ArticleBackdoor Trojan Uses TeamViewer Components to Spy on PCs in Europe, Russia, US
Crooks also delivering keyloggers and password stealers. A new trojan called BackDoor.TeamViewerENT.1 is using parts of the legitimate TeamViewer application to allow crooks to spy on infected systems....
View ArticleBad News Bears – Panda Banker Starts Looking More Like a Grizzly
Proofpoint researchers originally discovered the Panda Banker malware in February, 2016 [1]. At the time, it was being distributed via both targeted email campaigns and exploit kits (EKs). The instance...
View ArticleSnowden speculates leak of NSA spying tools is tied to Russian DNC hack
Former NSA security scientist concurs exposure by “Equation Group” connected to DNC leak. Two former employees of the National Security Agency—including exiled whistleblower Edward Snowden—are...
View ArticleNow data-stealing Marcher Android malware is posing as security update
If the malware found any German financial apps installed in the device, it would show a fake page asking for credentials of that particular institution. Unaware that the login page is a fake, the...
View ArticleNon-existent video involving Hillary Clinton and ISIS leader used as bait in...
Malicious attachment contains Adwind cross-platform remote access Trojan. Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging...
View ArticleAveo Trojan Used in Attacks Against Japanese Users
Palo Alto Networks has identified a malware family known as ‘Aveo’ that is being used to target Japanese speaking users. The ‘Aveo’ malware name comes from an embedded debug string within the binary...
View ArticleJBifrost: Yet Another Incarnation of the Adwind RAT
The Adwind Remote Access Trojan (RAT) is a popular Java-based backdoor capable of infecting Windows, Linux, Mac OS and Android operating systems. Its cross-platform nature, elaborate backdoor features,...
View ArticleNew FSociety Ransomware pays homage to Mr. Robot
Crooks hijack the FSociety brand for a lame ransomware. Fans of the Mr. Robot TV show would be glad to know that real-life crooks are taking inspiration from the TV series, and are now using the...
View ArticleMalware Infected All Eddie Bauer Stores in U.S., Canada
Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at...
View ArticleUAC Bypass with Elevated Privileges Works on All Windows Versions
Microsoft delays fixing the reported issue. enSilo senior security researcher Yotam Gottesman has discovered a simple method of bypassing the Windows User Account Control (UAC) mechanism that affects...
View ArticleNew DetoxCrypto Ransomware pretends to be PokemonGo or uploads a Picture of...
A new ransomware called DetoxCrypto has been discovered by MalwareHunterTeam that is currently being distributed under two different variants. The first variant looks like a generic ransomware but...
View ArticleHow the NSA snooped on encrypted Internet traffic for a decade
Exploit against Cisco’s PIX line of firewalls remotely extracted crypto keys. In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers...
View ArticleBrazilian banking Trojans meet PowerShell
Crooks are always creating new ways to improve the malware they use to target bank accounts, and now Brazilian bad guys have made an important addition to their arsenal: the use of PowerShell. Brazil...
View ArticleAround Four in Five DNSSEC Servers Can Be Hijacked for DDoS Attacks
DNSSEC is the best tool to protect against DNS hijacking and DNS cache poisoning but can be hijacked for DDoS attacks. Network security firm Neustar says that around 80 percent of DNSSEC servers have...
View ArticleRestore access to your PC with Trend Micro Ransomware Screen Unlocker
With so much attention focused on the file encrypting-type ransomware it’s easy to forget the simpler variety, which pops up when your PC boots and won’t allow access to your system until you pay up....
View Article