Necurs botnet, the monster is resurrected. Banking Trojans and Ransomware propagated via spam is bring backing the high-volume spam campaign Botnets are like monsters that surface back after some period of inactivity, this time, the monster it the dreaded Necurs botnet. The Necurs Botnet is one of the world’s largest malicious architectures, used to spread the dreaded […]
Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and other metadata. In January 2015, experts claimed that Apple is not able to read messages sent between devices through iMessages, but reported that the company but it is still able to access data in the backups. […]
The Talos team published a detailed analysis of the GozNym botnet, it was possible because the experts cracked the DGA algorithm used by the malware. In April 2015, the researchers from the IBM X-Force Research discovered a new banking Trojan dubbed GozNym Trojan that combines best features of Gozi ISFB and Nymaim malware. The GozNym has been seen targeting […]
Good news, the social network giant Facebook finally announced the availability of the open source OSquery developer kit for Windows. Facebook announced to have completed the porting of its detection open-source tool OSquery to Windows. The tool allows users to monitor networks and to detect potential malicious activities, such as the presence of malicious codes. The cross-platform tool, that […]
Experts from Carbon Black have spotted a new Adware campaign leveraging on sophisticated obfuscation techniques borrowed from Operation Aurora. Security experts from Carbon Black have spotted a new Adware campaign leveraging on very sophisticated obfuscation techniques. The Adware campaign was used by crooks to spread ransomware and according to the malware researchers using tactics to similarities to the […]
The hosting provider OVH continues to face massive DDoS attacks launched by a botnet composed at least of 150000 IoT devices. Last week, the hosting provider OVH faced 1Tbps DDoS attack, likely the largest one ever seen. The OVH founder and CTO Octave Klaba reported the 1Tbps DDoS attack on Twitter sharing an image that lists the […]
A Group of the researchers from the Iswatlab team at the University of Sannio demonstrated how is easy to create new malware that eludes antimalware. It’s not easy to ‘write’ a new malware that is able to evade the detection of antimalware and other defensive software, but it is easier to ‘produce’ a new malware that […]
Researchers at Palo Alto spotted a new campaign of the Russian Fancy Bear APT using a new Mac OS X Trojan against companies in the aerospace industry. In the last weeks, we have discussed a lot about a string of attacks that targeted the US Democratic National Committee (DNC), security experts collected evidence of the involvement […]
Microsoft encourages Windows users to remove the Windows Journal application by following the steps found in Microsoft update KB3161102. Microsoft has removed the Windows Journal application from its OSs due to the presence of multiple security flaws that can be exploited by hackers through specially crafted Journal files (.jnt) which are used to store notes […]
The Cyberkov Security Incident Response team spotted a cyber espionage campaign in Lybia conducted by a group named Libyan Scorpions. Thinking of Libya we have in mind a non-stable political country where various forces fight for the control of strategic territories and oil productions. but only a few experts know about cyber malicious activities in the area. Evidently, something […]