The Beebone botnet has been shut down in a joint operation between U.S. and European law enforcement and a number of private security companies. A new joint operation run by US and European law enforcement and a number of private security firms took down the polymorphic Beebone botnet, also known as AAEH. The operation was […]
Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]
Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]
Google has announced serious actions to prevent ad injectors that compromise the integrity of usersâ browsing experience across the globe. Google has declared âwarâ on programs that compromise the integrity of usersâ browsing experience across the globe. In a recent blog post featured on Googleâs Online Security Blog, Google has released information surrounding research that […]
Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]
Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]
Cybercriminals have been leveraging a vulnerability in a popular WordPress plugin to redirect the visitors of thousands of websites to exploit kits, a researcher has warned. Security experts at Germanyâs Computer Emergency Response Team (CERT-Bund) and Yonathan Klijnsma reveals that at least 3,000 websites have been compromised by attackers exploiting a known vulnerability in the […]
The presence of a vulnerability in the ANTLabs InnGate devices used in hotels and conference centers exposes users to risk of remote exploit. Recently the security firm Cylance has discovered a vulnerability (CVE-2015-0932) affecting the ANTLabs InnGate devices that are popular Internet gateway for visitor-based networks like the one we find in hotels and convention centers. The exploitation […]
According to Trend Micro, crooks in Asia are conducting the sextortion practice to the next level, including the used of mobile malware to get huge profits. Trend Micro released a new report to bring to light a criminal activity known as sextortion. “Sextortion is a means of coercing cybercrime victims to perform sexual favors or […]
A new strain of Vawtrak malware implements capabilities to send and receive data through encrypted favicons distributed over the Tor network. A new powerful variant of the Vawtrak malware, also known as Neverquest or Snifula, appeared in the wild. Vawtrak is considered by malware researchers one of the most dangerous malicious code that is threatening systems worldwide. The […]