Malware News, Articles and Updates

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

Top ten hacker tools identified - misuse of legitimate tools dominates inside the network.

X-ray and MRI machines among devices used as springboards for data breach attacks

X-ray and MRI machines among devices used as springboards for data breach attacks

By

An x-ray machine, an oncology system, an MRI machine: These are all important healthcare devices that researchers found harboring malware capable of installing backdoors on other connected systems for the purpose of exfiltrating data.

Autorooting malware LevelDropper detected, removed from Google Play Store

Autorooting malware LevelDropper detected, removed from Google Play Store

By

Researchers at Lookout identified a malicious app in the Google Play Store that disguises malware able to root a user's device so as to install unwanted applications.

Media files at risk from malware targeting Viber

Media files at risk from malware targeting Viber

By

Viber, a popular social media app, is being targeted by malware capable of stealing photos and videos.

Retefe banking Trojan now targeting UK banking customers

Retefe banking Trojan now targeting UK banking customers

Avast Security is reporting that the Retefe banking Trojan is now targeting UK banking customers by redirecting them to fake banking websites.

Troublemaking Bart ransomware follows in Dridex and Locky's footsteps

Troublemaking Bart ransomware follows in Dridex and Locky's footsteps

By

A newly discovered ransomware named Bart doesn't need to connect with a command-and-control server in order to encrypt victims' files, meaning even the strongest corporate firewalls may be unable to stop Bart from rendering a PC ineffective.

Malware spawns botnet in 25,000 connected CCTV cameras

Malware spawns botnet in 25,000 connected CCTV cameras

Tens of thousands of security cameras are the newest recruits to an DDoS botnet, noted for its powerful and unrelenting attacks

Fansmitter malware steals data through a computer's cooling fans

Fansmitter malware steals data through a computer's cooling fans

By

Israeli researchers have developed malware capable of transmitting data stolen from an air-gapped computer by manipulating the speed of its CPU and chassis cooling fans.

District court judge: FBI's hacking trick does not require warrant

District court judge: FBI's hacking trick does not require warrant

By

A U.S. District Court judge in Eastern Virginia presiding over a child pornography criminal trial has sided definitively with U.S. law enforcement in ruling that investigators do not need a warrant to remotely hack into suspects' computers.

DDoS it matter what motivates Lizard Squad?

DDoS it matter what motivates Lizard Squad?

Lizard Squad is best known for launching DDoS attacks against Microsoft Xbox Live and Sony PlayStation Network, and doing so 'for the lulz!' SC Magazine UK has been pondering whether the motivation actually matters?

German-speaking users targeted in new malware campaign

German-speaking users targeted in new malware campaign

By

German and Austrian computer users are being targeted with a new malware campaign.

Shoddy server configuration gives researchers glimpse into PunkeyPOS

Shoddy server configuration gives researchers glimpse into PunkeyPOS

By

PandaLabs was able to work around the password to access the server controlling PunkeyPOS without credentials because the bad guys didn't properly configure it, the researchers said.

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

By

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.

Malware found on Maryland parking garage payment servers

Malware found on Maryland parking garage payment servers

By

Annapolis, Maryland officials spotted malware on parking garage servers which may have compromised customer payment information.

Clinton Foundation possibly breached by Russian hackers who targeted DNC

Clinton Foundation possibly breached by Russian hackers who targeted DNC

By

Russian hacking groups may have broken into the Bill, Hillary and Chelsea Clinton Foundation, though the organization has not confirmed those assertions, reports said.

Researchers ID Brazilian banking Trojan creator

Researchers ID Brazilian banking Trojan creator

By

Security researchers discovered a new family of malware sold as a banking-Trojan-as-a-service. The cybercriminal rents the banking Trojan for about $600 per 10-day period.

Dial M for malware: 'Pawost' trojan hijacks Android phones to make unauthorized calls

Dial M for malware: 'Pawost' trojan hijacks Android phones to make unauthorized calls

By

A recently discovered mobile malware program is giving Android devices a mind of their own, causing them to use Google Talk to secretly and repeatedly place outgoing calls to mysterious phone numbers approximately every two minutes.

Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows

Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows

By

A comparative analysis by Fidelis Cybersecurity of malware samples provided by the DNC supported findings by CrowdStrike that a pair of intrusions were the handiwork of the Cozy Bear and Fancy Bear APT groups purported to have ties to Russian intelligence.

Ransomware migrates from Angler to Neutrino

Ransomware migrates from Angler to Neutrino

By

Following the shuttering of the Necurs botnet, security researchers noticed a subsequent drop in Angler exploit kits and other malware campaigns.

Ransomware distributors evolving their delivery strategies

Ransomware distributors evolving their delivery strategies

By

Developers behind the Nemucod downloader are working diligently to avoid detection.

Beyond encryption: researchers detail what makes ransomware tic

Beyond encryption: researchers detail what makes ransomware tic

By

As ransomware grows in popularity, TrendMicro researchers examined some of the tactics and techniques beyond encryption that enable the file locking malware to work.

Newly discovered malware campaign adds to TeamViewer's account hijacking woes

Newly discovered malware campaign adds to TeamViewer's account hijacking woes

By

TeamViewer continues to assert that poor password management is the chief cause behind a spate of user account hijackings, but a new alert from Trend Micro suggests that a malware campaign could be another piece to the puzzle.

Russian hackers access Trump files in DNC hack

Russian hackers access Trump files in DNC hack

By

Russian government hackers apparently broke into the Democratic National Committee (DNC) computer system and accessed the party's entire database on Republican candidate Donald Trump.

Russian banker trojan 'Lurk' flies under radar, picked up by researchers

Russian banker trojan 'Lurk' flies under radar, picked up by researchers

By

Kaspersky Lab researchers spotted a unique Russian banker trojan, dubbed "Lurk" targeting various industries.

FLocker ransomware now targeting Smart TVs

FLocker ransomware now targeting Smart TVs

By

Having a favorite character killed off on "The Walking Dead" may no longer be the worst thing that can happen while watching TV as Trend Micro researchers have found the first major example of ransomware that can attack a Smart TV with hackers using an updated version of FLocker that targets devices running the Android operating system.

Gamers looking for freebies hit with PUAs through torrent downloads

Gamers looking for freebies hit with PUAs through torrent downloads

By

Karma may be getting even with gamers who believe they are downloading free computer games illegally on torrent, when in fact the file obtained is not a game, but a potentially unwanted application (PUA).

Vawtrak malware updated to break tools used by researchers

Vawtrak malware updated to break tools used by researchers

By

A new version of banking malware includes updates that break tools typically used by security researchers to analyze the Vawtrak trojan.

Triada trojan now redirecting Android users to fake, malicious URLs

Triada trojan now redirecting Android users to fake, malicious URLs

By

The Android trojan "Triada," known for granting superuser privileges to other downloaded Trojans, is now embedding itself into at least four browsers in order to intercept URL requests and send users instead to malicious mobile websites, according to Kaspersky Lab.

Wendy's POS breach 'considerably' bigger than first thought

Wendy's POS breach 'considerably' bigger than first thought

By

Even more fast-food patrons may have a beef with The Wendy's Company, after the restaurant chain announced yesterday that the number of restaurants affected by a POS data breach may be "considerably higher" than first thought.

Hackers shift to Neutrino exploit kit to spread CryptXXX ransomware

Hackers shift to Neutrino exploit kit to spread CryptXXX ransomware

Change of tactics from cyber-criminals may be an attempt to bypass signature detection and improve infection performance.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US