Malware

Nodersok malware delivery campaign relies on advanced techniquesNodersok malware delivery campaign relies on advanced techniques

Nodersok malware delivery campaign relies on advanced techniques

Microsoft researchers observed a campaign delivering malware, dubbed Nodersok, relying on advanced techniques and elusive network infrastructure. Microsoft experts observed…

6 years ago
Malware-based attacks disrupted operations of Rheinmetall AG and Defence Construction CanadaMalware-based attacks disrupted operations of Rheinmetall AG and Defence Construction Canada

Malware-based attacks disrupted operations of Rheinmetall AG and Defence Construction Canada

A series of cyber attacks hit the defense contractors Rheinmetall AG and Defence Construction Canada (DCC) causing the disruption of their information…

6 years ago
Magecart 5 hacker group targets L7 RoutersMagecart 5 hacker group targets L7 Routers

Magecart 5 hacker group targets L7 Routers

IBM researchers observed one of the Magecart groups using a malicious code to inject into commercial-grade layer 7 L7 routers.…

6 years ago
Emsisoft released a new free decryption tool for the Avest ransomwareEmsisoft released a new free decryption tool for the Avest ransomware

Emsisoft released a new free decryption tool for the Avest ransomware

Emsisoft security firm has released a new free decryption tool for the Avest ransomware, a few days after the release…

6 years ago
Botnet exploits recent vBulletin flaw to protect its botsBotnet exploits recent vBulletin flaw to protect its bots

Botnet exploits recent vBulletin flaw to protect its bots

Security expert Troy Mursch of Bad Packets reported that a botnet is exploiting the recently disclosed vBulletin exploit to block other…

6 years ago
Study shows connections between 2000 malware samples used by Russian APT groupsStudy shows connections between 2000 malware samples used by Russian APT groups

Study shows connections between 2000 malware samples used by Russian APT groups

A joint research from Intezer and Check Point Research shows connections between nearly 2,000 malware samples developed by Russian APT groups. A…

6 years ago
Emsisoft releases a free decryptor for the WannaCryFake ransomwareEmsisoft releases a free decryptor for the WannaCryFake ransomware

Emsisoft releases a free decryptor for the WannaCryFake ransomware

Researchers at Emsisoft security firm have released a new free decryption tool for the WannaCryFake ransomware. Good news for the…

6 years ago

US Utilities Targeted with LookBack RAT in a new phishing campaign

Security experts at Proofpoint observed a new wave of phishing attacks aimed at US Utilities in an attempt to deliver…

6 years ago
A new Fancy Bear backdoor used to target political targetsA new Fancy Bear backdoor used to target political targets

A new Fancy Bear backdoor used to target political targets

Security experts at ESET have uncovered a new campaign carried out by Russia-linked Fancy Bear APT group aimed at political…

6 years ago
APT or not APT? What’s Behind the Aggah CampaignAPT or not APT? What’s Behind the Aggah Campaign

APT or not APT? What’s Behind the Aggah Campaign

Researchers at Yoroi-Cybaze ZLab discovered an interesting drop chain associated with the well-known Aggah campaign. Introduction During our threat monitoring…

6 years ago