Malware News, Articles and Updates

Malware evades researchers' VM environments by looking up their Word doc history

Malware evades researchers' VM environments by looking up their Word doc history

By

One of the techniques malware can use to evade researchers' virtualized or sandbox environments is accessing recent documents to determine if the infected machine has a history of legitimate usage.

Malicious websites visited every five seconds by enterprise workers, report

Malicious websites visited every five seconds by enterprise workers, report

By

A user at an enterprise organization accesses a malicious website every five seconds, according to research published by CheckPoint.

Hairy situation: Just For Men website rigged to redirect to RIG Exploit Kit

Hairy situation: Just For Men website rigged to redirect to RIG Exploit Kit

By

Executives at Combe Incorporated may have sprung a few new gray hairs after learning that the website for its Just for Men brand of hair coloring products was compromised to serve up malware.

Report, framework to balance safety and reliability needs of industrial operations

Report, framework to balance safety and reliability needs of industrial operations

By

The Industrial Internet Consortium (IIC) published a framework technical report to help organizations balance the safety and reliability needs of industrial operations.

DetoxCrypto ransomware imitates Malwarebytes software

DetoxCrypto ransomware imitates Malwarebytes software

By

Malwarebytes is warning users of a a variant of DetoxCrypto ransomware that is imitating the security vendor's software.

Dropbox moves to change install on Mac

Dropbox moves to change install on Mac

By

Mac users are claiming a Dropbox function that loads the desktop client of its cloud storage service on the accessibility menu of their system works like malware.

Locky developers upgrade ransomware's ability to perform offline encryption

Locky developers upgrade ransomware's ability to perform offline encryption

By

A new analysis of Locky ransomware configurations by IT security firm Avira has revealed improved offline capabilities that enhance its ability to automatically encrypt victims' files, without interaction with a command-and-control server.

Cybercrooks use drive-by malware to rob Reddit users' cryptowallets

Cybercrooks use drive-by malware to rob Reddit users' cryptowallets

By

Details of the attack are still blurry, attackers appear to be using malicious links designed to appeal to users monitoring the evolution of the Bitcoin prices.

Crysis ransomware now attacking businesses in Australia and New Zealand

Crysis ransomware now attacking businesses in Australia and New Zealand

By

Australian and New Zealand businesses are being hit with a ransomware campaign.

DOJ report, FBI impersonated journalist to infect suspect with malware

DOJ report, FBI impersonated journalist to infect suspect with malware

By

The U.S. Justice Department released a review of the FBI's impersonation of an Associated Press (AP) editor to infect a suspect with malware.

Quant Loader trojan downloader spotted in the wild

Quant Loader trojan downloader spotted in the wild

By

Forcepoint has come across a new trojan downloader called Quant Loader that has been spotted distributing Locky Zepto crypto-ransomware and Pony malware.

Sites associated with both presidential contenders spring leaks

Sites associated with both presidential contenders spring leaks

By

Data theft knows no boundaries. Personal information has been siphoned out from databases connected to both presidential campaigns.

Trojan distribution methods highlight need for info sharing in financial services industry

Trojan distribution methods highlight need for info sharing in financial services industry

By

As financial institutions scramble to prevent more attacks like the cyber heists that targeted SWIFT members, a recent report offers additional cause for the sector to improve information sharing practices.

Researchers discover spam email campaign using malicious MS Publisher to create backdoor

Researchers discover spam email campaign using malicious MS Publisher to create backdoor

By

A campaign of spam emails that use Microsoft Publisher attachments to infect companies with a Windows backdoor was disclosed by researchers.

Spike in malvertising attacks targeting adult websites

Spike in malvertising attacks targeting adult websites

By

A new Neutrino exploit kit invades a hack of a third-party ad server to deliver ransomware to adult website visitors.

Hackers hit Seagate NAS devices with cryptomining malware

Hackers hit Seagate NAS devices with cryptomining malware

Crypto-currency mining malware is back, driven in part by the growing popularity of alternatives to Bitcoin that are easier to mine and the increasing power of GPUs.

GovRAT 2.0 in the wild and hitting U.S. government agencies

By

The malicious actors behind the GovRAT malware have upgraded it to version 2.0 and using the new version to hit even more targets and increase the price of the software, now starting at $1,000.

Alleged vDOS creators nabbed in Israel

Alleged vDOS creators nabbed in Israel

By

Two Israeli teenagers were arrested for their alleged part in the running of vDOS, a so-called booter service selling kits for distributed denial-of-service (DDoS) attacks.

New RAA ransomware variant performs own encryption, attacks businesses

New RAA ransomware variant performs own encryption, attacks businesses

By

The ransomware RAA, which incorporates the information-stealing trojan Pony, has evolved to more effectively target companies, encrypting victims' files and stealing their data, most likely to infect their business contacts via spear phishing.

Leaked catalogue reveals disinformation campaign for sale

Leaked catalogue reveals disinformation campaign for sale

A leaked catalogue has exposed one India-based tech company's attempts to sell cyber-warfare services and disinformation campaigns

Latest Dridex includes new cryptocurrency targeting and new features to evade detection

Latest Dridex includes new cryptocurrency targeting and new features to evade detection

By

Despite its reduction in volume, Dridex malware is still actively being developed.

Latest Dridex includes new cryptocurrency targeting and new features to evade detection

Latest Dridex includes new cryptocurrency targeting and new features to evade detection

By

Despite its reduction in volume, Dridex malware is still actively being developed.

Paper: Only 200K mobile bots needed to impair U.S. 911 system with DDoS attack

Paper: Only 200K mobile bots needed to impair U.S. 911 system with DDoS attack

By

A few as 200,000 mobile bots would be enough to launch a successful DDoS attack against the U.S.' 911 infrastructure, significantly disrupting service nationwide, a new research paper from Ben-Gurion University reports.

Pokemon Go scammers turn to social media and imitation apps

Pokemon Go scammers turn to social media and imitation apps

By

The popularity of Pokémon Go is continuing to attract scammers looking to exploit users in search of a leg up in the game.

What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants

What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants

By

Kaspersky Lab today released an analysis of a newly discovered version of Mokes - a malicious, cross-platform backdoor with spying functionality - this one targeting Apple's OS X operating system.

ACLU asks why FBI unleashed malware on TorMail users, court filing

ACLU asks why FBI unleashed malware on TorMail users, court filing

By

Did the FBI infect users of a free email service with malware? That's the question the ACLU would like answered.

Hutton Hotel guests credit card info exposed during three-year long breach

Hutton Hotel guests credit card info exposed during three-year long breach

By

The Hutton Hotel payment processing system was vulnerable between September 2012 and 2015 exposing guests payment card information.

No honour among thieves: Sundown EK stealing exploits

No honour among thieves: Sundown EK stealing exploits

Trustwave researchers have looked at the new version of Sundown exploit kit, finding it to be riddled with other people's exploits

Linux rootkit, named for Pokémon's Umbreon, targets Linux

Linux rootkit, named for Pokémon's Umbreon, targets Linux

By

Researchers at Trend Micro have detected a new rootkit family that is going after Linux systems.

Luabot malware used to launch DDoS attacks

Luabot malware used to launch DDoS attacks

By

A Trojan that infects Linux platforms to launch distributed denial of service (DDoS) attacks was discovered by MalwareMustDie.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US