You searched for Ursnif | SC Media

Your search for Ursnif returned 20 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for Ursnif returned 20 results

Sort Results:

Relevant Recent
Malware

OLE attacks spike, supplementing malicious macros as attack vector

An increasing number of attacks using OLE packages has been spotted – giving users of Microsoft Office one more reason to be wary of what they click on when prompted by their computer. Object Linking and Embedding (OLE) package attacks are similar to those that use weaponized Word documents that require the victim to enable…
Cybercrime, Malware, Security News

Not-so-super Mario image hides code that downloads Ursnif trojan

Don’t tell Luigi, but Nintendo video game hero Mario may have joined Bowser on the dark side. A malspam sample targeting Italy was recently observed using a steganographic image of Mario (of Super Mario fame) to hide malicious code designed to infect victims with the Ursnif banking trojan. In a Feb. 8 company blog post,…
The News Team Blog

Beware of PDF rootkit-laden spam

It looks like PDF spam pushing pump-and-dump stocks and pharmaceuticals has died down, but the popular file format has a new use - to carry...
Malware, Security News

Great White North bombarded with malicious email campaigns, report

During the first four months of 2019 threat actors conducted thousands of malicious email campaigns, hundreds of which targeted Canadian organizations. Proofpoint researchers detected nearly 100 campaigns that specifically geo-targeted Canada or were customized for Canadian audiences in the first four months of 2019 mostly using the Emotet banking trojan, according to Proofpoint’s Beyond “North…
Malware, Security News

Heaven’s Gate exploit still defiled ten years later to deliver RATs and stealers

Threat actors were spotted using a decade-old antivirus evasion technique in at least three malware distribution campaigns.  A HawkEye Reborn keylogger, Remcos remote access trojan (RAT), and various other cryptocurrency mining trojan campaigns are using the “Heaven’s Gate” technique to avoid antivirus detection, Cisco Talos researchers said in a July 1 blog post. The technique…
Next post in Malware