- By Ionut Ilascu
- November 27th, 2014
New DareDevil PoS Malware Also Infects Ticket Machines and Electronic Kiosks
Public transport ticket solutions in public areas targeted
- By Ionut Ilascu
- November 26th, 2014
Over 23,000 Web Server IP Addresses Connect to CryptoPHP Control Domains
Backdoor spread by thousands of pirated themes and plugins for Joomla, WordPress and Drupal content management systems
- By Ionut Ilascu
- November 17th, 2014
Steam Password Stealer Is Stored on Google Drive
Malware poses as an image file, connects Czech Republic IP
- By Ionut Ilascu
- November 17th, 2014
BusyBox Devices Compromised Through Shellshock Attack
Bashlite relies on brute-force attacks to log in
- By Ionut Ilascu
- November 16th, 2014
New Variant of Dofoil Trojan Emerges with Strong Evasion Features
Relies on fake traffic to command and control server to send network-sniffing tools on the wrong track
- By Ionut Ilascu
- November 15th, 2014
New Encryption Ransomware Offers File Decryption Trial
Symmetric encryption is not less dangerous than asymmetric
- By Ionut Ilascu
- November 14th, 2014
Tor Exit Node Used to Deliver New Malware Family OnionDuke
Connection with group behind MiniDuke discovered
- By Ionut Ilascu
- November 14th, 2014
US-CERT Warns About the Masque Attack on iOS
The majority of iOS devices are affected by the problem
- By Ionut Ilascu
- November 11th, 2014
Uroburos Espionage Group Is Still Active, Relies on New Remote Access Trojan
New obfuscation and anti-analysis mechanisms have been added
- By Ionut Ilascu
- November 10th, 2014
Windows Version of WireLurker Also Used to Compromise iOS Devices
Same functionality has been recorded as in the case of OS X
- By Ionut Ilascu
- November 6th, 2014
Australia, UK and US Are Most Affected by Dridex Banking Trojan
Dridex-laced spam originates from several Asian countries
- By Ionut Ilascu
- November 6th, 2014
WireLurker Trojanizes OS X Apps, Compromises Non-Jailbroken iOS Devices
Malware has not reached maturity, updates still in progress
- By Ionut Ilascu
- October 31st, 2014
Crowti Crypto-Malware Hits the United States
Ransomware is funneled in through malicious email campaigns, drive-by attacks or other malware droppers
- By Ionut Ilascu
- October 29th, 2014
Gmail Drafts Used to Exfiltrate Data and Send Malicious Instructions
Malicious communication hides behind legitimate traffic
- By Ionut Ilascu
- October 23rd, 2014
CryptoWall 2.0 Rampage: 84 New Variants Spotted in Less than a Month
New version seems to be popular among cybercriminals
- By Ionut Ilascu
- October 17th, 2014
Modular Malware for OS X Relies on Open-Source Keylogger Code
Ventir malicious package is similar to Morcut/Crisis
- By Ionut Ilascu
- October 13th, 2014
Retefe Trojan Adds Japanese Banks on Target List
Malware still performs self-delete command