Threat actors in the wild are behind the Realstatistics campaign are leveraging on out-of-date CMSs to deliver the CryptXXX ransomware. Security experts from Sucuri security firm have spotted a new ransomware-based campaign dubbed ‘Realstatistics’ conducted by threat actors in the past two weeks. “Our Incident Response Team (IRT) has been tracking a mass infection campaign over the […]
Security experts from ProofPoint have spotted a new campaign operated by the APT Group NetTraveler that is targeting Russian and European organizations. NetTraveler is an ATP group first spotted by Kaspersky in 2013, when researchers discovered an espionage activity against over 350 high profile victims from 40 countries. The name of the operation derives from the malicious […]
The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data exposed in more than 1000 stores. The hack suffered by Wendy’s fast-food chain was bigger than thought and exposed sensitive information, including credit card data. Roughly one on three Wendy’s burger was hacked, a malware has infected PoS systems. Just after the […]
A newly emerging strain of malware dubbed Satana, which was first spotted last week, appears to be basing itself on crypto-lockers Petya and Mischa. Experts from Malwarebytes Labs have described the malicious software to be in the stage of âmalware-in-developmentâ with expected growth and evolution to occur over the coming weeks as its popularity and use […]
Researchers devised a method to unmask malware’s use of TLS without decrypting the data flow. The technique relies on analysis of observable data features. A team of security experts from Cisco demonstrated that it is possible to detect a malware in TLS connections without decrypting the traffic and block it. The researchers Blake Anderson, Subharthi Paul […]
New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the recent Locky Ransomware. The news was recently reported in a blog post by the Cisco Talos team: âWe are watching Zepto very carefully. Itâs closely tied to Locky, sharing many of the same attributes,â said Craig Williams, […]
A malicious application named EasyDoc Converter.app delivers a sophisticated malware dubbed Eleanor malware that opens a Tor backdoor on the victim’s machine. Experts from security firm Bitdefender have spotted a new malware, dubbed Eleanor malware (Backdoor.MAC.Eleanor), that once compromised Macs set up a backdoor through Tor network. The malicious application, dubbed EasyDoc Converter.app, pretend to be a […]
Chinese Ad company Yingmob âs developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad company Yingmobâs developers are allegedly responsible for the infection of approximately 10 million Android devices which is reportedly generating an income of around $300,000 USD per month. CheckPoint, the security company famous for their network […]
Cifas, a leading group in fraud protection, recently released its report on the fraud landscape for 2016 and the numbers are staggering. The first lesson taught to anyone working with classified data is that if someone can get all the little pieces of the picture, theyâll eventually have the whole picture. Unfortunately, many users of […]
ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in espionage campaigns targeting government organizations in Europe. Security experts from ESET security firm have spotted an espionage toolkit dubbed SBDHÂ that was used by threat actors in hacking operations targeting government organizations in Europe. The research observed infections in many countries, including […]