Tech Support Scammers Get Serious With Screen Lockers
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
Malware News | Infosec Blog | Information Security Tutorials
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
Crooks can steal money from ATMs using special credit cards. Skimer, a malware family targeting ATMs, has received a major update the past few months, and security researchers from Kaspersky areRead More →
Malicious Software can be Virus, Worm, Trojan Horse, Rootkit, Bot, DoS Tool,Exploit kit, Spyware. The objective of malware analysis is to gain an understanding of how specific pieces of malwareRead More →
A Trojan for Android designed to steal user login credentials needed to access online banking programs and to steal money from victims’ bank accounts. Android.SmsSpy.88.origin is distributed under the guiseRead More →
Proofpoint researchers have recently observed the re-emergence of two malware downloaders that had largely disappeared for several months. Hancitor (also known as Tordal and Chanitor) and Ruckguv have reappeared inRead More →
The financial messaging network says a commercial bank was targeted in an attack with ‘deep knowledge of operational controls’. Swift, the global financial messaging network that banks use to move billionsRead More →
A new installer for Petya was released that also installs the Mischa Ransomware if it is unable to gain Administrative privileges. In the past, when Petya was installed it requested Administrative privilegesRead More →
The Bucbi ransomware family, which dates back to early 2014, has received a significant update. In a recently observed attack, we also noted new tactics used to infect systems. TheRead More →
The Check Point research team uncovered a new Android malware campaign on Google Play it calls Viking Horde. Viking Horde conducts ad fraud, but can also be used for otherRead More →
usually when you end up with a virus on your computer, you do everything possible to get rid of it. Over at the Internet Archive, viruses are being preserved inRead More →
Backdoors are typically designed to execute cybercriminals’ commands on the infected machine. As a rule, they are used to gain a remote access to the user’s private information. Recently, DoctorRead More →
7ev3n ransomware appeared at the beginning of this year. In addition to typical features of encrypting files, it was blocking access to the system using a fullscreen window, and wasRead More →
.. but security researchers already cracked it According to security experts from Cylance, in the underground world of ransomware peddlers, there’s no ransomware kit better than AlphaLocker, sold by a RussianRead More →
Simple attacks plus user willingness to pay ransoms to get their files back means ransomware is on the rise, warn Kaspersky researchers. Ransomware has replaced advanced persistent threat (APT) networkRead More →
A few months ago, we reported on a white hack against Dridex where the malicious payload was removed and an Avira antivirus downloader added. It seems that a very successfulRead More →
Today, we’ve been alerted about an ongoing spam campaign against Skype users. The majority of those affected are in India, Japan, and the Philippines. Below is what the message looksRead More →
Today, we have encountered a new threat that’s a blast from the past. The Petya Trojan (detected by Kaspersky Lab products as Trojan-Ransom.Win32.Petr) infects the MBR preventing normal system loading,Read More →
We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on social media sites. What also struck us theRead More →
CryptMix is a mashup of CryptXXX and CryptoWall. A new type of ransomware created and distributed by a group of crooks calling themselves the Charity Team is trying to encourage usersRead More →
Hey Folks! So late last year a quote was going around about a comment for the Special Agent in charge of the Cyber Intelligence program for a Boston branch ofRead More →