Malware

How to recover files encrypted by all Teslacrypt Ransomware variantsHow to recover files encrypted by all Teslacrypt Ransomware variants

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the…

9 years ago
Bolek Banking Trojan, a Carberp Successor is spreading in the wildBolek Banking Trojan, a Carberp Successor is spreading in the wild

Bolek Banking Trojan, a Carberp Successor is spreading in the wild

The Bolek banking Trojan is one of the successors of the notorious Carberp Trojan that targets both 32-bit and 64-bit…

9 years ago
Necurs Botnet, one of the world’s largest malicious architecture has vanishedNecurs Botnet, one of the world’s largest malicious architecture has vanished

Necurs Botnet, one of the world’s largest malicious architecture has vanished

The Necurs Botnet, one of the world's largest malicious architecture, used to spread the dreaded threats appears to have vanished…

9 years ago
CRYPTXXX campaigns, threat actors switch to Neutrino EKCRYPTXXX campaigns, threat actors switch to Neutrino EK

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the…

9 years ago
Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware CriminalsCompanies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case…

9 years ago
Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defenseWatch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET…

9 years ago
FastPOS PoS malware implements a quick exfiltration methodFastPOS PoS malware implements a quick exfiltration method

FastPOS PoS malware implements a quick exfiltration method

Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration…

9 years ago
Ransomware campaigns … how to net $90,000 per yearRansomware campaigns … how to net $90,000 per year

Ransomware campaigns … how to net $90,000 per year

Experts at Flashpoint published an interesting analysis of a ransomware campaign organized by a small gang of cyber criminals. Cybercrime…

9 years ago
10,000+ WordPress websites compromised due to a flaw in WP Mobile Detector plugin10,000+ WordPress websites compromised due to a flaw in WP Mobile Detector plugin

10,000+ WordPress websites compromised due to a flaw in WP Mobile Detector plugin

More than 10,000 WordPress installations being exploited in the wild due to a vulnerability in the  WP Mobile Detector plugin.…

9 years ago
IRONGATE, a mysterious ICS Malware discovered in the wildIRONGATE, a mysterious ICS Malware discovered in the wild

IRONGATE, a mysterious ICS Malware discovered in the wild

Experts at FireEye spotted IRONGATE a mysterious strain of malware that appears to be designed to target industrial control systems…

9 years ago