Delilah, the first Trojan to recruit Insiders
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed toRead More →
Malware News | Infosec Blog | Information Security Tutorials
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed toRead More →
In part one of our web shell series we analyzed recent trends, code bases, and explored defensive mitigations. In part two we investigate a new web shell created by Chinese-speakingRead More →
Sites exploited by SoakSoak bots give the gift of CryptXXX malware. If you’ve visited the do-it-yourself project site of Dunlop Adhesives, the official tourism site for Guatemala, or a numberRead More →
Increasingly, browsers are taking on a central role in our daily lives. With web apps for everything, we have placed our most intimate data on online services such as Facebook,Read More →
Malicious macros made a comeback in 2015 to deliver malware. Now we’re seeing phishing emails use macros in Excel attachments to steal sensitive banking details. In 2015, we saw maliciousRead More →
Office exploit kits updates drop support for CVE-2012-0158. Two newer vulnerabilities targeting the Microsoft Office suite have become very popular in recent months, as Office exploit kit makers have updated theirRead More →
It may be a good idea to stay away from this software. The website of the Ammyy Admin remote desktop management utility has been abused over and over again by malwareRead More →
It’s not the next Stuxnet, says SentinelOne, it’s just very naughty code. Malware hyped as aimed at the hear of power plants is nothing of the sort according to securityRead More →
Hackers who want to make money but don’t want to get involved in the messy business of extracting payment from victims have turned to a malware-as-a-service business model. They write the codeRead More →
The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark web Following the first ever instance of macRead More →
Patch Tuesday wasn’t just about browser bugs. Microsoft has quietly killed a vulnerability that can be exploited to unlock ARM-powered Windows RT tablets and boot non-Redmond-approved operating systems. The Register hasRead More →
Some of the data looks legit, some looked fake. A group of hackers who call themselves “Pravyy Sector” [Right Sector] are extorting the Polish Government on Twitter, threatening to releaseRead More →
A lot has been said about the ransomware epidemic. The number of infections worldwide increases daily, as well as the number of different variants. Check Point researchers have been analyzingRead More →
Tool only drops malware after painstakingly dismantling AV and other defenses. A campaign that targeted a European energy company wielded malware that’s so sneaky and advanced it almost certainly is theRead More →
Tagged as “Ranscam”, Powershell and script-based malware is a botched smash-and-grab. There has been a lot of ingenuity poured into creating crypto-ransomware, the money-making malware that has become the scourge ofRead More →
Malware developers are fast learners. They adapt to new security measures in record time and find new ways to evade detection or at least stay hidden long enough to completeRead More →
A new ransomware called CTB-Faker was discovered that pretends to be the CTB-Locker ransomware. It is a poor imitator, though, as instead of encrypting a victim’s files, it will move themRead More →
We should always think twice before running an unknown program downloaded from the Internet. Of course not every application is dangerous, but it’s all too easy to find a maliciousRead More →
Nintendo’s new location-based augmented reality game ‘Pokémon GO’ is hot right now. Like really, really popular—so much so that players are spoofing their phone’s location using VPNs in their questRead More →
Decrypter works with older Jigsaw versions as well. Security researchers from Check Point announced over the weekend that they identified a way to decrypt files locked by the Jigsaw ransomware, bothRead More →