Malware

21st century defense-In-depth involves more than 2 AVs

If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That's the way we used to do it back in the '80s and '90s, but does this approach still work?

Report delves into RAT videos on YouTube

Report delves into RAT videos on YouTube

By

Remote Access Trojans (RATs) proliferate through YouTube tutorials and hacker forums, a new report from Digital Citizens Alliance suggested.

Modular Potao malware used to spy on targets in Ukraine, Russia

Modular Potao malware used to spy on targets in Ukraine, Russia

By

Potao was first being used against targets in Russia, but after a lull in activity, malware activity increased against targets in Ukraine.

HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers

HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers

By

Cybersecurity firm FireEye released a new report on APT29's complex malware HAMMERTOSS.

Researchers analyze faulty new Linux backdoor

By

Researchers at Dr. Web have discovered a faulty trojan designed as a backdoor for Linux that could also target Windows systems.

'GSMem' malware designed to infiltrate air-gapped computers, steal data

'GSMem' malware designed to infiltrate air-gapped computers, steal data

By

Israeli researchers detailed a new attack that can steal data from air-gapped computers, which are often seen as relatively safe.

Duke APT group devises new campaigns to maintain detection evasion

By

The Duke APT group continues to change up its tactics with the new "SeaDuke" and "CloudDuke" malware.

Fake games in Google Play redirect Android users to porn sites

Fake games in Google Play redirect Android users to porn sites

By

The threat is detected by Avast as Clicker-AR, and by requesting a certain permission it can redirect Android users to porn sites via their browser or other apps.

Free security tools help detect Hacking Team malware

Free security tools help detect Hacking Team malware

By

Vulnerabilities and other threats exposed in the Hacking Team leaks has spurred Rook Security and Facebook to each release free security tools.

Abandon XP! Malware is coming to get you

Abandon XP! Malware is coming to get you

Windows XP infections are set to skyrocket as Microsoft finally ends support for its anti-malware and malicious software removal tool.

Andromeda botnet used to distribute new point-of-sale malware

Andromeda botnet used to distribute new point-of-sale malware

By

Researchers with Trend Micro observed the malware threat being distributed predominately in the U.S. and Canada.

TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

By

Mainly known for its targeting of gaming files, TeslaCrypt continues to re-up its techniques to make it a debilitating threat.

Russian hackers exploit unusual Java zero-day to hit unnamed NATO country

Russian hackers exploit unusual Java zero-day to hit unnamed NATO country

Cyber-espionage group 'Pawn Storm' has been exploiting an unusual Java zero-day vulnerability to carry out drive-by-download attacks on a NATO country and US defence company, according to Trend Micro.

iPhones, jailbroken and not, vulnerable to Hacking Team spyware, firm finds

iPhones, jailbroken and not, vulnerable to Hacking Team spyware, firm finds

By

Despite reports that iOS devices must be jailbroken before compromise, researchers found other ways to install the spyware.

Popular Android games on Google Play observed stealing Facebook credentials

Popular Android games on Google Play observed stealing Facebook credentials

By

Cowboy Adventure is a working game with between 500,000 and 1,000,000 downloads, but it is also malware that has been observed stealing Facebook credentials.

APT28 uses leaked Hacking Team exploits in custom EK

By

According to ESET researchers, APT28 started using the Flash exploit on Wednesday, the same day Adobe released a patch for the issue.

Detroit Zoo, eight others across the county experience POS breach

By

The third-party vendor responsible for operating payment systems at the Detroit Zoo experienced a POS breach that affected eight other zoos.

Researchers say education sector end users more prone to risky behavior

By

End users in the education sector are twice as likely to be impacted by spyware and adware, and are equally as likely to visit malicious websites

Dino spyware targeted 'sensitive centers' in Iran for 18 months

By

Masoud Biglarian, head of the CERT Coordination Center, said Iran shored up its security to protect against Dino spyware.

Attackers use fake British Gas site to spread TorrentLocker

By

Researchers have seen an uptick in TorrentLocker infections in the U.K. and Turkey.

More than 440K new Android malware strains found in Q1, study finds

More than 440K new Android malware strains found in Q1, study finds

By

Mobile malware jumped 6.4 percent from Q4 2015 to Q1 2015 with half of the malware being financially motivated, a G DATA study showed.

Unencrypted GoPro updates leave users vulnerable to attack

By

GoPro Studio sends update requests and receives updates over unencrypted connections leaving users vulnerable to attack.

'Prized' app developers banned from distributing malware in FTC settlement

'Prized' app developers banned from distributing malware in FTC settlement

By

The Federal Trade Commission banned app developers Equiliv Investments and Ryan Ramminger from creating and distributing malware after their "Prized" app commandeered consumer devices to mine digital currency.

Researchers analyze backdoor 'Dino' linked to Animal Farm spy group

Researchers analyze backdoor 'Dino' linked to Animal Farm spy group

By

ESET analysts believe the sophisticated backdoor is the work of French speaking developers.

Dridex banking malware spreading through new spam campaign

Dridex banking malware spreading through new spam campaign

By

Heimdal Security outlined a recent Dridex-spreading spam campaign that tries to trick users into opening a malicious macros-enabled document.

Study: Click-fraud malware often leads to more dire infections

Study: Click-fraud malware often leads to more dire infections

By

Although often considered relatively innocuous, click-fraud malware infections could be the start of serious enterprise security issues.

New Tinba variant delivered via HanJuan Exploit Kit in malvertising attack

New Tinba variant delivered via HanJuan Exploit Kit in malvertising attack

By

Researchers with Malwarebytes observed the Tinba variant being distributed as part of an attack involving advertising and URL shortening service Adf.ly.

Understanding SSL/TLS best practices and application protection

Websites are under attack. In the last year, new vulnerabilities have been uncovered that allows malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information.

Firms track Dyre's rise to top financial malware threat

Firms track Dyre's rise to top financial malware threat

By

In the year following Gameover Zeus takedown efforts, Dyre has steadily emerged as the financial trojan of choice among cybercriminals.

Blackshades creator sentenced to 57 months in prison

By

The owner and co-creator of the Blackshades remote administration tool (RAT) was sentenced to 57 months in prison in a U.S. federal court on Tuesday.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US