malware

  1. Father

    Malware developer convicted in Samara region

    During the implementation of operational search activities of the Federal Security Service of Russia in the Samara region, a resident of the region was identified who was involved in the creation, use and distribution of malicious software in order to neutralize anti-virus protection tools. It...
  2. Father

    CISA opens access to the authorities weapon against viruses: Malware Next-Gen is now available to everyone

    Now the tool is available not only for the government, but also for private companies. CISA has announced the launch of a new malware analysis system, Malware Next — Gen, which allows organizations to analyze malware samples and other suspicious artifacts. The service is now available for...
  3. Father

    Check Point unmasked Hackers Responsible for Agent Tesla Malware Campaign

    Who were the mysterious "Gods" and "Bignosa", and how did the researchers manage to calculate them? A recent comprehensive study conducted by Check Point sheds light on the dark side of cyberspace, revealing the activities and identities of attackers using the Agent Tesla malware. Agent Tesla...
  4. Teacher

    MuddyWater changes tactics: legitimate software instead of malware

    File sharing sites are becoming a new attack vector on Israeli companies. The information security company Proofpoint has discovered a new phishing campaign of the Iranian group MuddyWater, during which legitimate software for remote monitoring and management of Atera is distributed among...
  5. Teacher

    Virtual wine – real risks: WINELOADER malware offers diplomats a glass for their safety

    How the ambassadors who decide to participate in the tasting, please in the clutches of spies. An unknown hacker group, dubbed SPIKEDWINE, attacks ambassadors from a number of European countries where Indian diplomatic missions operate. To achieve their goals, attackers use a new malicious...
  6. Teacher

    Chinese PC manufacturer Acemagic confirmed that its devices came with malware

    The Chinese company Acemagic admitted that some of its products were delivered with pre-installed malware. The company explains that they just wanted to reduce the download time and made changes to the Microsoft source code for this purpose. In early February 2024, youtuber The Net Guy...
  7. Teacher

    The era of new cyber heroes: how AI helps in the fight against malware

    AI forces you to rethink your defense strategies. A Los Alamos National Laboratory research team has made a significant breakthrough in cybersecurity, using artificial intelligence to improve malware analysis on a large scale. The developed approach made it possible to significantly advance in...
  8. Teacher

    Hunter-killer: how a simple malware can neutralize firewalls and antivirus programs

    The new generation of malware is aimed not at bypassing detection, but at completely destroying the protection of enterprises. Over the past year, the number of incidents aimed at disabling corporate protection has significantly increased in cyberspace. This is stated in the annual report Red...
  9. Teacher

    Malware won't pass: Google introduces in-depth APK permissions check

    Even the most inexperienced users can no longer be afraid of scammers. Google launching a new pilot program to combat financial fraud, which aims to block the installation of external APKs that request access to risky permissions. APK or Android Package is a file format used for distributing...
  10. Teacher

    FBI Says It has Cleared Hundreds of Routers of Volt Typhoon Malware

    FBI officials said they were able to eliminate the KV botnet used by hackers from the Chinese group Volt Typhoon (aka Bronze Silhouette, DEV-0391, Insidious Taurus and Vanguard Panda) to evade detection during attacks that target critical US infrastructure. It is reported that Volt Typhoon used...
  11. Brother

    MetaStealer from the Ministry of Digital Development: hackers disguise malware as security certificates

    Phishing attacks in Russia are reaching a new level of sophistication. F. A. C. C. T warns of a new wave of targeted phishing attacks on users of state-owned online services in Russia. The attackers send fake emails allegedly from the Ministry of Digital Development of Russia with a request to...
  12. Brother

    WhiteSnake: Malware that can control your computer via Tor

    Why should you be careful when installing PyPI packages? The Fortinet FortiGuard Labs team found malicious packages in the Python Package Index (PyPI) repository that deliver the WhiteSnake Stealer infostiler to Windows systems. Packages containing malware are called nigpal, figflix, telerer...
  13. Brother

    Hackers from China set their sights on the West: what did Blackwood hide in its NSPX30 modular malware?

    Attackers bypass antivirus programs and permanently gain a foothold in their victims systems. The Slovak company ESET discovered the activities of a previously unknown group of hackers associated with China, and assigned it the code name Blackwood. The group has been active since 2018 and...
  14. Brother

    Hackers from China set their sights on the West: what did Blackwood hide in its NSPX30 modular malware?

    Attackers bypass antivirus programs and permanently gain a foothold in their victims ' systems. The Slovak company ESET discovered the activities of a previously unknown group of hackers associated with China, and assigned it the code name Blackwood. The group has been active since 2018 and...
  15. Brother

    Анализ C2-сервера SystemBC Malware выявляет хитрости доставки полезной нагрузки

    Исследователи кибербезопасности пролили свет на командно-контрольный сервер (C2) известного семейства вредоносных программ под названием SystemBC. "SystemBC можно приобрести на подпольных торговых площадках и поставляется в архиве, содержащем имплантат, сервер командования и управления (C2) и...
  16. Brother

    Descendants of the family: Kasseika made it impossible to analyze malware

    What does the band have in common with the legendary BlackMatter? Cybersecurity company Trend Micro has discovered that in 2023, the Kasseika ransomware group joined an increasing number of cybercrime groups using the BYOVD (Bring Your Own Vulnerable Driver) tactic, which allows attackers to...
  17. Brother

    Voronovo resident detained for developing malware

    A resident of Voronovo is accused of developing malicious computer programs. The details were reported by the telegram channel “102. Neman" Department of Internal Affairs of the Grodno Regional Executive Committee. It was established that a 35-year-old Belarusian received an order via the...
  18. Brother

    Water Curupira uses PikaBot malware to deploy ransomware

    Experts attribute this activity to the termination of QakBot in August. Trend Micro has recorded an active distribution of the PikaBot malware by the Water Curupira group. Operations began in the first quarter of 2023 and continued until the end of June, before resuming in September. PikaBot...
  19. Brother

    Full control and theft of funds: Android malware Chameleon has become even more dangerous

    In the new iteration, the banking Trojan has received qualitatively new attack capabilities. Cybersecurity researchers discovered a new version of the Android Trojan for Android called Chameleon, which is aimed primarily at European users of banking applications. The new version of the mobile...
  20. Brother

    Return of QakBot: hotel business became the first victim of the updated malware

    Attackers are testing a new version with some changes. QakBot malware is once again being used in phishing campaigns, despite the successful operation of law enforcement agencies "Duck Hunt" to eliminate the QakBot infrastructure. QakBot (Qbot) started out as a banking Trojan in 2008. Malware...
Top