Cybercrime | SC Media

Cybercrime

Downloads of cracked software distribute ransomware via adware bundles

By

Websites offering cracked versions of popular software programs have recently been serving up adware bundles that secretly deliver a variant of STOP ransomware. According to a pair of reports from Bleeping Computer founder Lawrence Abrams, the scheme came to light in December 2018 with the appearance of the malicious encryptor “Djvu” – so named because…

Abuse.ch takes down 100K malware distribution sites in 10 months

By

Swiss non-profit threat sharing, Abuse.ch, announced its platform has managed to takedown 100,000 malware distribution sites in 10 months in a recent project which consisted of sharing malicious URL used for distribution. Abuse.ch’s URLhaus project was launched last year to collect malicious URLs by allowing anyone to sign up with a Twitter account to report…

telegrammessageapp_875461

Researchers find Telegram bot chatter is actually Windows malware commands

By

Decrypted Telegram bot chatter was found to actually be a new Windows malware, dubbed GoodSender, which uses the messenger platform to listen and wait for commands. Forcepoint researchers discovered what it described as a “fairly simple” year old malware that creates a new administrator account that enables remote desktop once it infects a victim’s device.…

Google Play boots fake apps that spy on devices’ motion sensor data before dropping Anubis malware

By

A fake currency converter and a phony battery utility program are among the latest fraudulent apps to be expunged from Google Play, according to researchers who discovered they were infecting users with a version of the Anubis banking malware family. Both fraudulent apps employ a crafty technique to determine whether it is safe for them…

GandCrab returns with trojans and redundency

By

The GandCrab ransomware has returned with a new set of trojans in addition to its initial infection. The addition of new tools comes just over a week after at least one threat actor began using a combination the info stealer Vidar with the ransomware to increase their odds of taking something of value away from…

Threat actors spoof thousands of debit cards at Tampa Bay Credit Union

By

Tampa Bay Credit Union members had their debit card information spoofed after threat actors generated false cards using the financial institution’s bin numbers. Threat actors identified the credit union’s bin numbers, the first six numbers on a debit card, and used software from the dark web to attach the Bin numbers to actual account holder’s…

Ukrainian nationals charged with hacking SEC docs in $4.1 million scam

Ukrainian nationals charged with hacking SEC docs in $4.1 million scam

By

The Department of Justice has charged two Ukrainian nationals for hacking into the Security and Exchange Commission’s (SEC) computer system to steal confidential corporate information and sell it to the highest bidder or to make trades. Artem Radchenko and Oleksandr Ieremenko were charged in the United States Court District of New Jersey with securities fraud…

Feds flip El Chapo’s IT Consultant to gain drug lord’s encryption keys

By

Dutch law enforcement intercepted the communications of Mexican drug suspected drug lord and former leader of the Sinaloa Cartel Joaquín Guzmán, also known as “El Chapo,” after his IT consultant turned informant. Between April 2011 and January 2012 U.S. authorities captured a total of 1,500 calls, many of which originated from El Chapo, after his…

Click2Gov breach threatens credit card data of Hanover County residents

By

A data breach of an third-party online payment system has compromised the personal information of Hanover County, Virginia, residents. In an official online notification, county officials have disclosed that an unauthorized party stole credit card information processed by the Click2Gov payment portal between Aug. 1, 2018 and Jan. 9, 2019. Exposed information includes customer names,…

How to Stop the Insider Threat from Switching Off Your Security Lights

By Armaan Mahbod, manager, insider threat analyst team, Dtex Systems You’ve spent millions on security. You have the latest and smartest firewalls installed. You have deployed cutting-edge AI-powered antivirus solutions. Phishing emails are stopped cold by your expensive anti-spam and email security gateway solutions, some of the time at least. You are using a CASB…

Next post in Opinion