Malware


NEWS 
  • New Windows Trojan Spreads MIRAI Malware To Hack More IoT Devices

    February 9, 2017

    MIRAI – possibly the biggest IoT-based malware threat that emerged last year, which caused vast internet outage in October last year by launching massive distributed denial-of-service (DDoS) attacks against the popular DNS provider Dyn. Now, the infamous malware has updated itself to boost its distribution efforts. Researchers from Russian cyber-security firm Dr.Web have now uncovered a Windows ...

  • Watch Out! First-Ever Word Macro Malware for Apple Mac OS Discovered in the Wild

    February 9, 2017

    After targeting Windows-based computers over the past few years, hackers are now shifting their interest to Macs as well. The emergence of the first macro-based Word document attack against Apple’s macOS platform is the latest example to prove this. The concept of Macros dates back to 1990s. You might be familiar with the message that reads: “Warning: ...

  • Invisible Malware Found in Banking Systems in over 40 Countries

    February 7, 2017

    Banks, telcos, and even governmental agencies in the United States, South America, Europe, and Africa are being targeted by hackers in a series of ongoing attacks that are extremely difficult to detect. According to a new Kaspersky Lab report, at least 140 banks and other enterprises have been infected by malware that’s nearly invisible. Although this ...

  • Polish Banks Hacked using Malware Planted on their own Government Site

    February 6, 2017

    In what considered to be the largest system hack in the country’s history and a massive attack on the financial sector, several banks in Poland have been infected with malware. What’s surprising? The source of the malware infection is their own financial regulator, the Polish Financial Supervision Authority (KNF) — which, ironically, is meant to keep ...

  • Dridex Is Back, Uses New Windows UAC Bypass Method

    January 30, 2017

    Banking malware Dridex is back and it’s worse, targeting British financial institutions with a new technique that has the capability of bypassing Windows User Account Control. Researchers at security firm Flashpoint detected small phishing and spear-phishing campaigns targeting specific recipients. The messages contained macros in document attachments that allowed the download of the Dridex malware. This User ...

  • New Trojan Turns Thousands Of Linux Devices Into Proxy Servers

    January 25, 2017

    A new Trojan has been discovered in the wild that turns Linux-based devices into proxy servers, which attackers use to protect their identity while launching cyber attacks from the hijacked systems. Dubbed Linux.Proxy.10, the Trojan was first spotted at the end of last year by the researchers from Russian security firm Doctor Web, who later identified ...

  • Over 199,500 Websites Are Still Vulnerable to Heartbleed OpenSSL Bug

    January 22, 2017

    It’s more than two and half years since the discovery of the critical OpenSSL Heartbleed vulnerability, but the flaw is still alive as it appears that many organizations did not remediate properly to the serious security glitch. It was one of the biggest flaws in the Internet’s history that affected the core security of as many ...

  • How A Bug Hunter Forced Apple to Completely Remove A Newly Launched Feature

    January 20, 2017

    Recently Apple released a new Feature for iPhone and iPad users, but it was so buggy that the company had no option other than rolling back the feature completely. In November, Apple introduced a new App Store feature, dubbed “Notify” button — a bright orange button that users can click if they want to be alerted ...

  • Billion-Dollar Hacker Gang Now Using Google Services to Control Its Banking Malware

    January 19, 2017

    Carbanak – One of the most successful cybercriminal gangs ever that’s known for the theft of one billion dollars from over 100 banks across 30 countries back in 2015 – is back with a BANG! The Carbanak cyber gang has been found abusing various Google services to issue command and control (C&C) communications for monitoring and ...

  • What’s Up With the WhatsApp ‘Backdoor’ Story? Feature or Bug!

    January 13, 2017

    By definition: “Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized access to data, ” either the backdoor is in encryption algorithm, a server or in an implementation, and doesn’t matter whether it has previously been used or not. Yesterday, we published a story based on findings reported by security researcher ...