Malware news & analysis | SC Media

Malware

trojan-horse2_329557

Bachosens trojan: Lone wolf after big game, Symantec report

A lone-wolf hacker is going after big game, albeit to little reward, according to a post on Symantec’s Security Response blog. While the Symantec Security Response researchers who analyzed the attack campaign concluded that the hacker was highly sophisticated – his code bears similarities to malware put in play by nation-state actors – and his tragets…

Malware can be spotted via network traffic, study

Studying network traffic going to suspicious domains could indicate to security administrators that their network is infected with malware – months before they might capture a sample of the invasive malware, says a new study out of the Georgia Institute of Technology. The researchers behind the study claim their findings point to a paradigm shift…

Cryptocurrency

Cryptocurrency miner Adylkuzz attack could be bigger than WannaCry

The attackers behind WanaCrypt0r/WannaCry were not the only cybercriminals putting DoublePulsar and EternalBlue to use this weekend, as Proofpoint spotted the stolen NSA tools being used with the cryptocurrency miner Adylkuzz. The Adylkuzz attack may not only have been larger than WannaCry, but could have been one of the mitigating factors that helped shut down…

VBA malware on rise, templates make it easier to write code

Nemucod delivering credential-stealing trojan, Palo Alto

Researchers at Palo Alto Networks have spent the past five months examining a malware campaign that uses the Nemucod downloader to ultimately deliver a trojan that siphons out credentials, according to a post on the company blog. Unit 42, the Palo Alto Networks threat intelligence team, has uncovered several iterations of the Nemucod downloader malware…

Next post in Malware