Malware

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger components

By

The modular malware was named "Ventir," by researchers at Kaspersky.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other advanced groups

By

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

Phishing email delivers keylogger malware, also takes screenshots

Phishing email delivers keylogger malware, also takes screenshots

By

The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.

Malicious ads on YouTube direct users to Sweet Orange exploit kit

By

The campaign targeted users running vulnerable versions of Internet Explorer.

'Sandworm Team' exploits zero-day bug in espionage campaign

'Sandworm Team' exploits zero-day bug in espionage campaign

By

A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.

Kmart breach likely exposed payment card data

Kmart breach likely exposed payment card data

By

Sears revealed in a filing to the SEC that Kmart systems were infected with malware "undetectable" by current AV solutions.

HP to remove digital signature that code-signed malware

By

Journalist Brian Krebs said the company is sending out advisories to clients saying it would remove the certificate after a 2010 security incident.

Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores

Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores

By

Attackers used a third-party vendor's credentials to compromise systems in 395 U.S. Dairy Queen locations and one Orange Julius site.

Suspected POS hacker Seleznev faces slew of new charges

By

Roman Seleznev is now charged in a 40-count indictment brought by a federal grand jury in Seattle.

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

By

A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.

Emma Watson Facebook scam infects users with malware

By

A new Facebook scam leverages the popularity of the British actress to infect users with a trojan that steals data and signs up victims to a premium SMS scam.

ATM malware 'Tyupkin' found on over 50 machines in Europe, spreads to U.S.

ATM malware 'Tyupkin' found on over 50 machines in Europe, spreads to U.S.

By

The malware allowed criminals, with physical access to ATMs, to steal millions, Kaspersky revealed.

Apple updates XProtect, blacklists iWorm variants

By

After more than 18,000 Macs were infected with iWorm malware, Apple has updated its XProtect system to identify and block certain variants.

Bash bug payload downloads KAITEN DDoS malware source code

Bash bug payload downloads KAITEN DDoS malware source code

By

The purpose is to add compromised systems to botnets that are primarily focused on launching DDoS attacks.

Chase breach affects 76 million accounts, raises questions about detection failure

Chase breach affects 76 million accounts, raises questions about detection failure

By

As the reach of a recent Chase breach grows to 76 million household and seven million business accounts, security experts call for change.

Researchers discover Mac botnet

By

Doctor Web researchers have discovered a new malware that is being used to amass Macs into a giant botnet.

ComputerCOP aimed at protecting kids is really spyware, EFF says

ComputerCOP aimed at protecting kids is really spyware, EFF says

By

The Electronic Frontier Foundation says the spyware sports a keylogger and is widely distributed by law enforcement agencies.

Researchers release BadUSB code at Derbycon

By

Two months after SR Labs demonstrated that flaws allow malware to infect USB devices, two researchers have taken the code public.

Chinese iOS trojan targets jailbroken devices

By

The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.

Malware in Mexico, Ukraine ATM attacks may be culprit in Malaysia

By

Police are not naming the malware used, but speculation casts an eye on Backdoor.Ploutus or Backdor.PadPin.

FBI to open Malware Investigator portal to security researchers

By

The portal is a virus analysis tool that examines suspicious files and shares information about them.

As EMV deadline looms, industry looks to next ATM attack front

As EMV deadline looms, industry looks to next ATM attack front

By

Next year, EMV migration in the U.S. will inevitability change fraudsters' attack methods.

Jimmy Johns' POS vendor confirms breaches at other restaurants

By

Signature Systems, Inc. confirmed that 108 other businesses were impacted by the malware installed on its systems.

Top websites deliver CryptoWall ransomware via malvertising

By

The CryptoWall ransomware being delivered comes with a valid digital signature and initial VirusTotal results showed zero detections.

'Mozart' is malware behind Home Depot, DHS report suggests

'Mozart' is malware behind Home Depot, DHS report suggests

By

The Wall Street Journal reported that a Secret Service investigation uncovered malware customized to attack Home Depot.

Researchers analyze Dyre sample with new features

Researchers analyze Dyre sample with new features

By

Researchers with Proofpoint have analyzed a version of the Dyre banking trojan that has been updated with new features.

Cyber attack on Japan Airlines impacts up to 750,000

By

A phishing attack may have resulted in the theft of personal information belonging to customers of Japan Airlines's frequent flier club.

'Spike' toolkit scales multi-vector DDoS with Windows, Linux hosts

'Spike' toolkit scales multi-vector DDoS with Windows, Linux hosts

By

Akamai's PLXsert researchers analyzed the new DDoS toolkit.

Reducing cyber risk in industrial control systems with advanced network segmentation

The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework.

Researchers discover Tinba variant with 64-bit support, other tricks

Researchers discover Tinba variant with 64-bit support, other tricks

By

Seculert researchers discovered a variant of the Tinba banker trojan that can infect more systems and better skirt detection.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US