- Security
- By Sergiu Gatlan
- December 7th, 2018
Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report
This type of attack is ten times more likely to succeed
- Security
- By Sergiu Gatlan
- December 7th, 2018
'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer
Also contains a disabled encrypted traffic sniffer module
- Security
- By Sergiu Gatlan
- December 7th, 2018
U.S. Commercial Chains Targeted by TA505 with Personalized Malware Campaigns
Multiple malware strains used to bank on holiday sales
- Security
- By Sergiu Gatlan
- December 6th, 2018
IoT Botnets Behind 78% of Malware Network Events in 2018 According to Report
150 million devices used during the malware analysis process
- Security
- By Sergiu Gatlan
- December 6th, 2018
Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method
The malware now spams the emails collected from victims
- Security
- By Sergiu Gatlan
- December 5th, 2018
Chinese Ransomware Locks 100,000 Devices, Asks for $16 WeChat Pay Ransoms
WeChat Ransom malware propagated using compromised apps
- Security
- By Sergiu Gatlan
- December 4th, 2018
Fractured Block Malware Campaign Uses CARROTBAT to Attack Korean Crypto Targets
The campaign drops various payloads on compromised machines
- Security
- By Sergiu Gatlan
- December 3rd, 2018
KingMiner Crypto Threat Uses Brute-Force To Compromise Windows Server Machines
Employs multiple evasion techniques to bypass detection
- Security
- By Sergiu Gatlan
- November 28th, 2018
Threat Group Uses CAD Malware to Compromise Energy/Automotive Targets
The industrial espionage group is active since at least 2014
- Security
- By Sergiu Gatlan
- November 28th, 2018
Iranian Duo Indicted for Running the SamSam Ransomware Operation
SamSam locked hospitals, government, and school IT systems
- Security
- By Sergiu Gatlan
- November 27th, 2018
GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper
The modular backdoor can be upgraded remotely by attackers
- Security
- By Sergiu Gatlan
- November 27th, 2018
Threat Actor Uses DNS Redirects, DNSpionage RAT to Attack Government Targets
Malware used in the attacks communicates via DNS tunneling
- Security
- By Sergiu Gatlan
- November 27th, 2018
Modular Malicious Android Apps Pose as Voice Tools, Collect PII Data With Survey
The fake apps also displayed automated clicking behavior
- Security
- By Sergiu Gatlan
- November 21st, 2018
Emotet Banking Trojan Uses Stolen Templates to Boost Phishing Campaign Numbers
The IcedID banking trojan is the second stage payload
- Security
- By Sergiu Gatlan
- November 21st, 2018
Lazarus APT Uses Modular Backdoor to Target Financial Institutions
WannaCry makers also recently used Fastcash to empty ATMs
- Security
- By Sergiu Gatlan
- November 20th, 2018
200K Outlaw Botnet Uses SSH Brute Forcing to Propagate, Monero Mining for Profit
Botnet kills and hijacks active miners with its own binaries
- Security
- By Sergiu Gatlan
- November 20th, 2018
560,000 Duped Into Installing Android Malware in the Form of Fake Driving Games
Anti-malware classify it either as Hiddad or as unknown risk