A cyber gang is improving its version of the TrickBot banking Trojan by implementing the self-spreading worm-like capabilities used by WannaCry and NotPetya Cybercriminals most of all are capitalizing the lesson from the recent WannaCry and NotPetya ransomware massive attacks. At least one cyber gang is improving its version of the TrickBot banking Trojan by implementing the self-spreading […]
Former Employee of the Healthcare giant Bupa offered for sale records of 1 Million clients on Dark Web. A former employee of healthcare giant Bupa was selling between 500,000 and 1 million records on the healthcare giant Bupa was selling between 500,000 and 1 million records on the dark web. The former employee whose identity […]
Experts at Proofpoint noticed the infamous cyber crime gang Carbanak has added a new JScript backdoor dubbed Bateleur Backdoor to its arsenal. According to researchers at security firm Proofpoint, the infamous cyber crime gang cyber crime gang Carbanak has added a new JScript backdoor dubbed Bateleur Backdoor to its arsenal. Carbanak, aka Carbanak, aka FIN7, has also used […]
Security experts at Kaspersky discovered the dreaded Svpeng Trojan has been recently modified to implement keylogger features. Cyber criminals are becoming even more aggressive and are using new stealth techniques. Security experts at Kaspersky have discovered that one of the most dangerous Android banking Trojan, Svpeng, has been recently modified to implement keylogger features to […]
The US pharmaceutical company Merck revealed that the massive NotPetya cyberattack has disrupted its worldwide operations. The US pharmaceutical company Merck revealed that the massive NotPetya cyberattack has disrupted its worldwide operations. The news was part of the Merck’s financial results announcement for the second quarter of 2017, according to the pharmaceutical giant the ransomware destructed operations […]
TOPransom – Analyzing the entire process from getting an email attachment to powning the ransom server trying to stop the infection. Hi folks, today I want to share a quick but intensive experience in fighting cybercrime. I wish you would appreciate the entire process of getting an email attachment to powning the ransom server trying […]
Crooks recently hacked the popular Google Chrome extension Copyfish after compromising the Chrome Web Store account of German developer team a9t9 software. Trojan malware has been around for a long time. A user installs an application to accomplish one task, but behind the scenes, the application is performing a completely different task — usually unwanted. The […]
At DEF CON hacking conference experts demonstrated how to abuse a machine learning system dubbed OpenAI Gym to create malware that can avoid detection. We have discussed several times about the impact of Artificial Intelligence (AI) on threat landscape, from a defensive perspective new instruments will allow the early detections of malicious patterns associated with threats, […]
Malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones. Another case of pre-installed malware make the headlines, malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones, including Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu […]
Security experts from ESET that spotted the Industroyer malware used against Ukraine’s power grid released a free tool for ICS Malware analysis ESET researchers Robert Lipovsky and Anton Cherepanov have released a free tool for the analysis of ICS malware. The security duo is the same that discovered the CrashOverride/Industroyer malware that targeted the Ukraine’s power […]