Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report

Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report

This type of attack is ten times more likely to succeed

'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer

'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer

Also contains a disabled encrypted traffic sniffer module

U.S. Commercial Chains Targeted by TA505 with Personalized Malware Campaigns

U.S. Commercial Chains Targeted by TA505 with Personalized Malware Campaigns

Multiple malware strains used to bank on holiday sales

IoT Botnets Behind 78% of Malware Network Events in 2018 According to Report

IoT Botnets Behind 78% of Malware Network Events in 2018 According to Report

150 million devices used during the malware analysis process

Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method

Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method

The malware now spams the emails collected from victims

Chinese Ransomware Locks 100,000 Devices, Asks for $16 WeChat Pay Ransoms

Chinese Ransomware Locks 100,000 Devices, Asks for $16 WeChat Pay Ransoms

WeChat Ransom malware propagated using compromised apps

Fractured Block Malware Campaign Uses CARROTBAT to Attack Korean Crypto Targets

Fractured Block Malware Campaign Uses CARROTBAT to Attack Korean Crypto Targets

The campaign drops various payloads on compromised machines

KingMiner Crypto Threat Uses Brute-Force To Compromise Windows Server Machines

KingMiner Crypto Threat Uses Brute-Force To Compromise Windows Server Machines

Employs multiple evasion techniques to bypass detection

Threat Group Uses CAD Malware to Compromise Energy/Automotive Targets

Threat Group Uses CAD Malware to Compromise Energy/Automotive Targets

The industrial espionage group is active since at least 2014

Iranian Duo Indicted for Running the SamSam Ransomware Operation

Iranian Duo Indicted for Running the SamSam Ransomware Operation

SamSam locked hospitals, government, and school IT systems

GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper

GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper

The modular backdoor can be upgraded remotely by attackers

Threat Actor Uses DNS Redirects, DNSpionage RAT to Attack Government Targets

Threat Actor Uses DNS Redirects, DNSpionage RAT to Attack Government Targets

Malware used in the attacks communicates via DNS tunneling

Modular Malicious Android Apps Pose as Voice Tools, Collect PII Data With Survey

Modular Malicious Android Apps Pose as Voice Tools, Collect PII Data With Survey

The fake apps also displayed automated clicking behavior

Emotet Banking Trojan Uses Stolen Templates to Boost Phishing Campaign Numbers

Emotet Banking Trojan Uses Stolen Templates to Boost Phishing Campaign Numbers

The IcedID banking trojan is the second stage payload

Lazarus APT Uses Modular Backdoor to Target Financial Institutions

Lazarus APT Uses Modular Backdoor to Target Financial Institutions

WannaCry makers also recently used Fastcash to empty ATMs

200K Outlaw Botnet Uses SSH Brute Forcing to Propagate, Monero Mining for Profit

200K Outlaw Botnet Uses SSH Brute Forcing to Propagate, Monero Mining for Profit

Botnet kills and hijacks active miners with its own binaries

560,000 Duped Into Installing Android Malware in the Form of Fake Driving Games

560,000 Duped Into Installing Android Malware in the Form of Fake Driving Games

Anti-malware classify it either as Hiddad or as unknown risk

 
Want more? Browse: