Malware

Malware Hunter, the project developed by Shodan and Recorded Future to find C&C ServersMalware Hunter, the project developed by Shodan and Recorded Future to find C&C Servers

Malware Hunter, the project developed by Shodan and Recorded Future to find C&C Servers

Shodan and security firm Recorded Future launched Malware Hunter, a service that allows scanning the Internet to identify botnet C&C…

8 years ago
TrickBot is a rising threat, the banking Trojan now targets Private BankingTrickBot is a rising threat, the banking Trojan now targets Private Banking

TrickBot is a rising threat, the banking Trojan now targets Private Banking

According to a new analysis conducted by the IBM's X-Force security team, a new wave of attacks powered by the TrickBot banking Trojan…

8 years ago
Lenovo warns of IBM Storwize shipped with infected initialization USB drivesLenovo warns of IBM Storwize shipped with infected initialization USB drives

Lenovo warns of IBM Storwize shipped with infected initialization USB drives

Some USB flash drives containing the initialization tool shipped with the IBM Storwize for Lenovo contain a malicious file. Some…

8 years ago
DOK malware, a stealthy MAC OS spyware that inspects your HTTPS TrafficDOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK malware, a stealthy MAC OS spyware that inspects your HTTPS Traffic

DOK Malware is a stealthy malicious code recently discovered by researchers at security firm CheckPoint, it affects almost ant Mac…

8 years ago
Cracking APT28 traffic in a few secondsCracking APT28 traffic in a few seconds

Cracking APT28 traffic in a few seconds

Security experts from security firm Redsocks published an interesting report on how to crack APT28 traffic in a few seconds.…

8 years ago
The Hajime Botnet continues to grow and implements a new attack techniqueThe Hajime Botnet continues to grow and implements a new attack technique

The Hajime Botnet continues to grow and implements a new attack technique

The mysterious Hajime Botnet continues to grow and reached 300,000 IoT Devices, the author also implemented a new attack method.…

8 years ago
Linux Shishiga malware, a threat in dangerous evolutionLinux Shishiga malware, a threat in dangerous evolution

Linux Shishiga malware, a threat in dangerous evolution

Malware researchers from security firm ESET have discovered a new Linux threat dubbed Shishiga malware targeting systems in the wild.…

8 years ago
US authorities indicted the suspected operator of the Kelihos BotnetUS authorities indicted the suspected operator of the Kelihos Botnet

US authorities indicted the suspected operator of the Kelihos Botnet

The Russian hacker Petr Levashov has been indicted in connection with the infamous Kelihos Botnet that was recently dismantled. It…

8 years ago
Europol, European police agencies and private actors dismantled cybercrime ringEuropol, European police agencies and private actors dismantled cybercrime ring

Europol, European police agencies and private actors dismantled cybercrime ring

The Europol coordinated an international operation that dismantled a cybercrime ring that was offering services and tools to conceal malware.…

8 years ago
Fake app hiding a SMSVova spyware went undetected for years in the Google Play StoresFake app hiding a SMSVova spyware went undetected for years in the Google Play Stores

Fake app hiding a SMSVova spyware went undetected for years in the Google Play Stores

Millions of users looking to get software updates have downloaded an app hiding a spyware called SMSVova through the official…

8 years ago