Malware Pieces Use Several Techniques to Avoid Investigative Efforts

Malware Pieces Use Several Techniques to Avoid Investigative Efforts

Malware authors try to send researchers on the wrong track

New Gameover ZeuS Variant and Shylock Rebuild Botnets

New Gameover ZeuS Variant and Shylock Rebuild Botnets

Almost 10,000 bots attempt to contact security firm sinkhole

Operating Shylock Trojan Was a Full-Time Job

Operating Shylock Trojan Was a Full-Time Job

Developers worked from nine to five, Monday to Friday

Shylock/Caphaw Banking Trojan Network Disrupted

Shylock/Caphaw Banking Trojan Network Disrupted

International law enforcement operation seizes Shylock command and control machines

Shylock Trojan Used to Target Customers of 24 Major Banks

Shylock Trojan Used to Target Customers of 24 Major Banks

The malware uses several tricks to avoid being detected and disrupted

Fake Web Browser Updates Hide Sirefef/Shylock Malware

Fake Web Browser Updates Hide Sirefef/Shylock Malware

Users are advised to update software only from trusted websites

Shakespearian Banking Trojan Shylock Starts Targets New Countries, New Sectors

Shakespearian Banking Trojan Shylock Starts Targets New Countries, New Sectors

Symantec experts have analyzed the latest versions of the malware

Microsoft Blocks Even More Skype Malware

Microsoft Blocks Even More Skype Malware

The company tries to keep users on the safe side with enhanced protection

Microsoft Blocks Shylock Malware Spreading via Skype

Microsoft Blocks Shylock Malware Spreading via Skype

The company has confirmed that its users are now on the safe side

New Shylock Malware Infecting Skype Users

New Shylock Malware Infecting Skype Users

A new version of the Trojan horse is now out there in the wild

Users Advised to Disable Smart Card for Protection Against Shylock Malware

Users Advised to Disable Smart Card for Protection Against Shylock Malware

This method is used to trick the threat into thinking that it's being analyzed

Shylock Malware Replaces Documents with Shortcuts to Malicious Files

Shylock Malware Replaces Documents with Shortcuts to Malicious Files

This is possible thanks to a component called DiskSpread

Shylock Trojan Injects Attacker’s Phone Number into Bank Websites

Shylock Trojan Injects Attacker’s Phone Number into Bank Websites

The Shakespearean virus returns with an ace up its sleeve

Fraudsters Rely on Live Chat Sessions to Steal Bank Accounts

Fraudsters Rely on Live Chat Sessions to Steal Bank Accounts

Crooks take their time to chat with victims to make sure they obtain what they need

Shakespearian Malware Avoids Antivirus Detection

Shakespearian Malware Avoids Antivirus Detection

Three clever mechanisms allow it to remain undetected