Malware News, Articles and Updates

PowerWare ransomware variant poses as Locky, but can be decrypted

PowerWare ransomware variant poses as Locky, but can be decrypted

By

The ransomware PowerWare that commandeers Microsoft's PowerShell utility to download and run malicious code, now has a variant that mirrors Locky ransomware.

CrypMIC ransomware is a CryptXXX copycat, with a few twists

CrypMIC ransomware is a CryptXXX copycat, with a few twists

By

CryptXXX ransomware has a doppelganger - it's called CrypMIC. And the resemblance doesn't appear to be a coincidence.

Android anti-malware feature boot verification will be strictly enforced in Nougat OS

Android anti-malware feature boot verification will be strictly enforced in Nougat OS

By

A system integrity feature that prohibits Android mobile devices from booting when the presence of malware is suspected will now be strictly enforced in version 7.0.

Cicis Pizza delivers the bad news, confirms breach at 138 locations

Cicis Pizza delivers the bad news, confirms breach at 138 locations

By

Cicis Pizza has officially acknowledged a payment card data breach in 138 of its restaurant locations, after reports of a point-of-sale malware attack first came to light last month.

Chrome browser extensions discovered engaging in Facebook click fraud

Chrome browser extensions discovered engaging in Facebook click fraud

By

Google has removed a group of malicious browser extensions from its Chrome Web Store, after an independent researcher discovered the programs were hijacking users' Facebook accounts for click-fraud purposes.

Average ransomware demand is £525, 57% of attacks target consumers

Average ransomware demand is £525, 57% of attacks target consumers

Organisations are increasingly being targeted by ransomware and more often than not pay the ransom to regain control of their data.

Burned rubber: Dunlop online slideshow reportedly compromised, visitors redirected to Neutrino kit

Burned rubber: Dunlop online slideshow reportedly compromised, visitors redirected to Neutrino kit

By

A website for the rubber goods brand Dunlop was compromised to distribute ransomware to customers viewing a slideshow of DIY projects featuring its product line, according to endpoint security software firm Invincea.

Ammyy Admin site delivers drive-by-download attacks

Ammyy Admin site delivers drive-by-download attacks

By

Kaspersky Lab researchers spotted the Ammyy Admin being used as a dropper trajan to install the Lurk trojan and other malware.

White paper: 100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics

White paper: 100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics

By

In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.

Russian security firm linked to Carbanak cybergang

Russian security firm linked to Carbanak cybergang

By

The Carbanak cybergang which facilitated the heist of $1 billion from banks around the world last year, was linked to the Russian security firm Infocube.

Deal with the devil: Ransomware experiment proves you can negotiate price down

Deal with the devil: Ransomware experiment proves you can negotiate price down

By

Ironically, the cybercriminals holding your computer files for ransom may be offering you a better customer experience than your average cable provider or insurance company.

Cerber ransomware C&C server shut down by research firm and CERT-Netherlands

Cerber ransomware C&C server shut down by research firm and CERT-Netherlands

By

A malicious spam email campaign discovered by FireEye, used Microsoft Word attachments containing macros that launched a command and control Cerber installers.

Report: Number of unique malware families climbs 61% over first half of 2016

Report: Number of unique malware families climbs 61% over first half of 2016

By

The number of unique malware families found actively attacking business networks grew 61 percent from January 2016 to June, with 2,420 distinct threats detected last month, according to Check Point Software Technologies' June Threat Index.

Delilah trojan seeks company weaknesses through insiders

Delilah trojan seeks company weaknesses through insiders

By

Delilah trojan designed to target potential insiders via social engineering, extortion, and ransomware tactics.

Three arrested in $2.5M Taiwanese ATM malware heist

Three arrested in $2.5M Taiwanese ATM malware heist

By

Three suspects were arrested after a network of Eastern European and Russian cybercriminals used malware to steal $2.5 million in cash from dozens of machines around the country.

Change in exploit tactics caused dramatic surge of Realstatistics malware infections

Change in exploit tactics caused dramatic surge of Realstatistics malware infections

By

The Realstatistics malware campaign discovered in June to be infecting thousands of Joomla! websites gained steam by shifting infection tactics after the introduction of ModSecurity rules closed off its original attack method.

Cerber ransomware strain now targeting Office 365 users

Cerber ransomware strain now targeting Office 365 users

By

Researchers discover a new strain of the Cerber ransomware targeting Office 365 users. The variant is part of an emerging trend of ransomware that targets victims using cloud platforms.

Researchers detect malware in TLS connections without decrypting traffic

Researchers detect malware in TLS connections without decrypting traffic

By

Researchers discovered a way to detect and block malware in Transport Layer Security (TLS) connections without decrypting the traffic.

Neutrino Exploit Kit adds researcher's IE exploit code to its repertoire of attacks

Neutrino Exploit Kit adds researcher's IE exploit code to its repertoire of attacks

By

The Neutrino Exploit Kit has added another weapon to its arsenal, adopting a working exploit of Microsoft's Internet Explorer browser after an independent security researcher designed and published the source code of said exploit.

In a first, CryptXXX ransomware spread via spam

In a first, CryptXXX ransomware spread via spam

By

For the first time ever, CryptXXX ransomware is being distributed through malicious document attachments in email campaigns.

Russian Defence Ministry to fight NetTraveler Trojan

Russian Defence Ministry to fight NetTraveler Trojan

Russia's defence sector is taking steps to reduce NetTraveler Trojan attacks and some defence manufacturers are postponing computerisation using western technology due to fears of cyber-espionage.

Sophisticated nation-state sponsored malware could shut down electric grid

Sophisticated nation-state sponsored malware could shut down electric grid

By

SentinelOne researchers discovered spotted a sophisticated nation-state sponsored malware campaign with potential to knock out an electric grid.

Malware suspected in ATM heist in Taiwan

Malware suspected in ATM heist in Taiwan

By

ATMs in Taiwan were spewing money over the weekend in what authorities believe were malware-aided thefts.

Snack attack: A crimeware-as-a-service menu for wannabe hackers

Snack attack: A crimeware-as-a-service menu for wannabe hackers

By

When compared to the financial damage a cyberattack can create, the cost of most crimeware-as-a-service (CaaS) offerings looks like a bargain, based on the prices listed in a "Hacking Menu" compiled by WatchGuard Technologies.

Researchers spot uptick in Nymaim detections as infections creep into Brazil

Researchers spot uptick in Nymaim detections as infections creep into Brazil

By

ESET researchers spotted and uptick in Nymaim malware detections during the first half of 2016 and noticed a series of targeted attacks in Brazil.

Malware on Omni Hotel POS systems scarfed payment card info

Malware on Omni Hotel POS systems scarfed payment card info

By

Omni Hotels & Resorts said guests had to physically present payment cards at one of its affected POS systems to be affected by malware stealing payment card information during a six-month period.

UPDATE: Prepare for trouble: Pokemon Go sparks privacy issues, malware and muggings

UPDATE: Prepare for trouble: Pokemon Go sparks privacy issues, malware and muggings

By

Researchers spotted cyber scammers and street crooks looking to take advantage of the success of the popular Pokemon app.

GootKit banking trojan upgraded

GootKit banking trojan upgraded

By

IBM's X-Force Research team reported that the GootKit banking trojan has recently received a facelift with the malware now being harder to spot and a lighter video-capture module.

SWIFT hires two cybersecurity firms in wake of digital heists

SWIFT hires two cybersecurity firms in wake of digital heists

By

The financial messaging cooperative SWIFT announced today that it hired two cybersecurity firms and also created a Customer Security Intelligence team in order to bolster cyber defenses, strengthen forensic investigations and promote information sharing.

NetTraveler resurfaces in Chinese APT's spear-phishing campaign

NetTraveler resurfaces in Chinese APT's spear-phishing campaign

By

The 12-year-old Trojan NetTraveler has resurfaced in an APT group's spear-phishing campaign against Russian and Eastern European targets.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US