Experts found a new alarming method dubbed Bashware attack that allows attackers to silently run malware to bypass even the most common security solutions, The new Windows 10 feature Windows Subsystem for Linux (WSL)Â that implements the Linux bash terminal in Microsoft operating system could be exploited by malware to run undetected. The feature was recently […]
Crooks are abusing Facebook CDN servers to deliver malware and evading detection exploiting the trust in the CDN network of the social networking giant. Crooks are abusing Facebook CDN (Content Delivery Network)Â servers to store malware and to deliver it evading detection exploiting the trust in the CDN network of the social network giant. Researchers from […]
Malware researchers at Palo Alto Networks have spotted a 2007 variant of Babar, a strain of malware likely designed by the French Intelligence. In March 2015, researchers detected Babar for the first time, analysis led them into believing it was a product of the French intelligence. According to the experts, Babar malware was used by the General Directorate for […]
Researchers at Lookout spotted a new mobile remote access Trojan dubbed xRAT tied to 2014 âXsser / mRATâ surveillance campaign against Hong Kong protesters. A new mobile remote access Trojan dubbed xRAT includes appears as the evolution of high-profile spyware Xsser / mRAT malware that was first spotted in late 2014 when it was used in a surveillance […]
Google removed almost 300 Android apps from the official Play Store after expert at ESET reported they were abused for a DDoS attack. This week Google has removed at least 300 apps from the Official Play Store after learning that apps were being hijacked to power DDoS attacks. âWe identified approximately 300 apps associated with […]
Security experts discovered last week that a US government website was hosting a JavaScript downloader used to deliver the Cerber ransomware. The security researcher at NewSky Security Ankit Anubhav discovered last week that a US government website was hosting a malicious JavaScript downloader that was delivering the dreaded Cerber ransomware. #Javascript #malware using #powershell hosted […]
Experts spotted a new EITest campaign leveraging HoeflerText Popups to target Google Chrome users and push NetSupport Manager RAT or Locky ransomware Security expert Brad Duncan with both the SANS Internet Storm Center and Palo Alto Networksâ Unit 42, has spotted a malware campaign leveraging bogus popups that alert users to a missing web-font. The crooks are targeting Google […]
Malware writer is offering for free a malware dubbed Cobian RAT in the underground, but the malicious code hides an ugly surprise. In the dark web, it is quite easy to find alone vxers and hacking forums that offer malware and customize them according to buyers’ needs. Recently researchers from Zscaler have spotted a remote access […]
Security researchers from McAfee have spotted a new Android banking Trojan dubbed MoqHao, targeting South Korean users via SMS phishing messages. Attackers send phishing emails with a malicious code link that tricks victims into believing that it points to a lost private picture or a Chrome update. When victims click on the shortened links in the SMS […]
The security firm Symantec has discovered another cyber espionage campaign against India and Pakistan which is likely to be state-sponsored. Security experts at Symantec have uncovered a sustained cyber spying campaign against Indian and Pakistani entities involved in regional security issues. The nature of the targets and the threat actors’ techniques suggest it is a […]