Malware

Fending off APTs from all fronts

Cybercriminals often target those areas of a network that pose the least resistance to get what they're after - usually the personally identifiable information of customers and employees, trade secrets, intellectual property and still other critical data.

E-cigarette from China distributes malware to systems

By

An executive's system was reportedly infected by malware after he charged an e-cigarette purchased on eBay through his system's USB port.

Researchers identify POS malware targeting ticket machines, electronic kiosks

Researchers identify POS malware targeting ticket machines, electronic kiosks

By

Electronic kiosks and ticketing systems are among the targets of a new type of point-of-sale threat known as "d4re|dev1|".

Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor

Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor

By

A backdoor referred to as CryptoPHP is being packaged with pirated Joomla, WordPress and Drupal themes and plugins and used for illegal search engine optimization.

DroidJack RAT hits hacker forums, comes from legitimate app developers

By

A researcher at Symantec traced DroidJack's origins back to legitimate Android app developers and previous RATs.

APT operation 'Double Tap' exploits serious Windows OLE bug

APT operation 'Double Tap' exploits serious Windows OLE bug

By

The group, APT3, is also believed to be behind Operation Clandestine Fox, which used social engineering to lure victims into installing malware.

Regin: nation-state possibly behind the stealthy modular spying malware

Regin: nation-state possibly behind the stealthy modular spying malware

By

Symantec is referring to the malware as 'groundbreaking,' particularly due to the advanced techniques it uses to conceal itself.

CoinVault changes up traditional ransomware techniques

CoinVault changes up traditional ransomware techniques

By

A newly identified ransomware takes extra precaution to hide from researchers and possibly show good faith on the attackers' part.

Stuxnet-like espionage tool discovered by researchers

By

Experts at Symantec have come across a sophisticated cyber espionage tool that exhibits a rare complexity of features similar to past cyberespionage malware.

Privacy, rights groups support gov't spyware detection tool

By

The EFF, Amnesty International and other organizations are lending support to Detekt, an open source spyware detection tool.

Malicious banking apps in Google Play target Brazilian Android users

By

Researchers at Kaspersky Lab said the first trojan banker, published by "Governo Federal," was predictable.

Citadel variant targets master passwords, authentication solutions

Citadel variant targets master passwords, authentication solutions

By

Credentials, entered through password management software and a Nexus authentication tool, are the target of this new variant.

RTF exploit is delivered through spear phishing scheme

By

Researchers at McAfee have identified a new attack that exploit a Microsoft Word ActiveX control vulnerability.

Tibetan NGOs targeted in APT attack

By

Gh0st RAT was identified in a spear phishing campaign to target Tibetan NGOs recently.

Authorities nab WireLurker masterminds

By

Police in Beijing arrested three suspects behind the malware that targeted users in China.

Backdoors delivered to Japanese orgs by way of Ichitaro exploit

By

Security firm Symantec calls the cyberespionage campaign "Operation CloudyOmega."

Man charged with installing malware in his former company's network

By

Arturas Samoilovas allegedly illegally accessed the computer network of Eaton Corporation and installed malware after he was denied a position at the company.

Google Play app spread SMS trojan for more than a year

By

An app masquerading as a provider of downloadable content was, in actuality, a SMS trojan that could have subscriber victims to a daily feed that cost 37 cents per day.

Report provides in-depth look at POS malware used in some of the biggest breaches

Report provides in-depth look at POS malware used in some of the biggest breaches

By

A Cyphort Labs report provides an in-depth analysis of Backoff, BlackPOS and FrameworkPOS, malware used in some of the biggest breaches.

'Masque Attack' writes over genuine apps; steals personal and financial data

'Masque Attack' writes over genuine apps; steals personal and financial data

By

Using WireLurker malware, the attack plays off a vulnerability in third-party app stores to overwrite legitimate apps with malicious ones.

Mobile fraud report notes reliance on OTPs as top concern

Mobile fraud report notes reliance on OTPs as top concern

By

One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.

DarkHotel espionage campaign targets business execs staying in luxury hotels

By

The Kaspersky Labs Global Research and Analysis Team came across the campaign, which hides on the networks of hotels located in various countries.

Backoff infections spike 33 percent at Q4 start, more variants surface

By

Damballa observed the spike in infections, which followed a Backoff peak in Q3.

Apple addresses OS X, iOS WireLurker malware threat, C&C goes offline

Apple addresses OS X, iOS WireLurker malware threat, C&C goes offline

By

WireLurker was first observed infecting OS X systems when a user downloaded a trojanized app from a third-party store in China, and then infecting iOS devices that connected to the infected OS X system via USB.

Cousin of Bugat trojan, 'Dridex,' spreads using macros

Cousin of Bugat trojan, 'Dridex,' spreads using macros

By

Trend Micro detailed the variant and attackers' delivery techniques.

Study: Organizations assailed by cyber attacks, 15 percent are targeted

Study: Organizations assailed by cyber attacks, 15 percent are targeted

By

Vectra's Post Breach Report analyzed data gathered from more than 100,000 hosts over five months.

Experts detect spike in Rovnix trojan infection in U.K.

By

More than 130,000 computers have been infected by the malware in the country, which encrypts communication with its C&C servers to avoid detection.

Your data's gone mobile: Keep it secure

There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.

Experts share new insight on Sandworm APT exploits, BlackEnergy malware

Experts share new insight on Sandworm APT exploits, BlackEnergy malware

By

The Sandworm Team, a supposed Russian APT group, is known for spreading BlackEnergy malware by way of spear phishing.

Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes

Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes

By

On Oct. 27, researchers with Symantec observed that Spin.com was redirecting visitors to the Rig Exploit Kit to serve them malware.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US