You searched for Avast | SC Media

Your search for Avast returned 17 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Cybercrime remove

Your search for Avast returned 17 results

Sort Results:

Relevant Recent
Malware

CCleaner attackers gained access to app developer’s network via TeamViewer

The adversaries who infected 2.27 million machines last year using a modified version of the computer maintenance app CCleaner were able to pull off the supply chain attack by gaining unauthorized access to the developer’s network using the remote desktop access program TeamViewer. Ondrej Vlcek, EVP and GM of the consumer business unit at Avast Software, the…
Cybercrime, Legal, Malware, Security News

Authorities free 850,000 machines from grasp of Retadup worm

Law enforcement authorities rescued roughly 850,000 machines that were infected with Retadup malware by replacing the command-and-control infrastructure with a disinfection server, causing the worm to self-destruct. The operation took place last July under the auspices of the French National Gendarmerie’s Cybercrime Fighting Center and the FBI, and was significantly aided by researchers at Avast,…
Cybercrime, IoT, Malware, Security News

Torii malware could be gateway to more sophisticated IoT botnet attacks

Researchers have discovered yet another Internet of Things botnet derived from Mirai — but instead of conducting DDoS attacks or cryptomining like most variants, this one’s core functionality is exfiltrating information and executing malicious commands. Making matters worse, the malware’s potential target list is unusually large, considering that it supports attacks against a variety of…
Security News

Reitspoof mysterious multistage malware makes its rounds

A multi-staged malware dropping multiple payloads is infecting its victims without a clear purpose and has shown a significant uptick in activity since January 2019. Dubbed Reitspoof, the malware has bot capabilities although Avast researchers believe it was primarily designed as a dropper, according to a Feb. 16 blog post. The malware’s developers used several…
Next post in APTs/cyberespionage