You searched for Loki/ | SC Media

Your search for Loki/ returned 19 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for Loki/ returned 19 results

Sort Results:

Relevant Recent

Did you mean: locki/

Tor network remains unsure how feds discovered and shut down Silk Road 2.0
Coronavirus, Security News

COVID-19 inspires Nigerian scammers to launch waves of BEC campaigns

Nigerian cybercriminal actors are shamelessly exploiting the COVID-19 pandemic to infect government health care agencies, academic medical programs, medical publishing firms and more with malware, largely for the purpose of conducting Business Email Compromise operations. In a company blog post, researchers with Palo Alto Networks’ Unit 42 threat intelligence team have reported observing three prominent…
Malware

Malspam campaign delivers LokiBot by abusing Windows Installer

A recently observed malspam-based phishing campaign is exploiting a remote code execution vulnerability in Microsoft Office to infect victims with LokiBot malware via the Windows Installer service, Trend Micro has reported. Trend Micro has previously detailed other attacks leveraging CVE-2017-11882, a memory corruption vulnerability in Office’s Equation Editor, which was patched last November. But in a rather unique twist, this…
Peter Stephenson
The Threat Hunter Blog

Floki Bot – A Zeus Wannabe with Delusions of Grandeur?

Well, it was a nice summer and, as I waited for the magazine to finish developing the new look on our website I spent a lot of time crawling around the Dark Web looking for tidbits of interest.
phishing tech2
Malware, Phishing, Security News

Malicious document builder LCG Kit a key component in recent phishing campaigns

Researchers at Proofpoint have uncovered a sophisticated tool commonly used by malicious actors to build weaponized documents for phishing campaigns. Dubbed LCG Kit, the service has helped small crime groups create docs capable of spreading a variety of remote access trojans and information stealers, such as Loki Bot, FormBook, Agent Tesla, Remcos, AZORult, REvcode RAT and…
Ransomware

SLocker no slacker: Researchers detect 400-plus new subvariants of Android ransomware

After two months of quietude, the Android ransomware SLocker commenced a new feeding frenzy late last year, introducing over 400 new subvariants into the wild from December 2016 through February 2017, mobile services provider Wandera has reported. “These strains are targeting businesses’ mobile fleets through easily accessible third party app stores and websites where rigorous…
Cybercrime, Security News

SilverTerrier cybergang evolving new techniques for BEC scams

Palo Alto Networks Unit 42 researchers have actively monitored the evolution of SilverTerrier Nigerian Business Email Compromise (BEC) threat actors. The threat actors have been attributed to more than 51,000 malware samples and 1.1 million cyber attacks over the last four years as they are gaining experience quickly as they adopt new technologies, techniques, and…
Next post in Network Security