Jump to content

Search the Community

Showing results for tags 'malware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. Bulletproof hosting admins plead guilty to running cybercrime safe haven Four individuals from Eastern Europe face 20 years in prison for Racketeer Influenced Corrupt Organization (RICO) charges after pleading guilty to running a bulletproof hosting service as a safe haven for cybercrime operations targeting US entities. The bulletproof hosting service was founded by Russian citizens Aleksandr Grichishkin and Andrei Skvortsov, who hired Lithuanian Aleksandr Skorodumov and Estonian Pavel Stassi as the organization's system admin and administrator, respective
  2. New Windows 'Pingback' malware uses ICMP for covert communication Today, researchers have disclosed their findings on a novel Windows malware sample that uses Internet Control Message Protocol (ICMP) for its command-and-control (C2) activities. Dubbed "Pingback," this malware targets Microsoft Windows 64-bit systems, and uses DLL Hijacking to gain persistence. Abuses real Windows service to load malicious DLL Today, Trustwave senior architect Lloyd Macrohon and principal security researcher Rodel Mendrez, have released their findings on a novel Windows ma
  3. New Buer Malware Downloader Rewritten in E-Z Rust Language It’s coming in emails disguised as DHL Support shipping notices and is apparently getting prepped for leasing on the underground. A variant of the Buer malware, which is being distributed in emails disguised as DHL support shipping notices, comes with a fresh code rewrite in the popular Rust language and looks like it may be in the process of prepping for rental to other cybercrooks. Using the increasingly popular, efficient and easy-to-use Rust programming language will
  4. PortDoor Espionage Malware Takes Aim at Russian Defense Sector The stealthy backdoor is likely being used by Chinese APTs, researchers said. A previously undocumented backdoor malware, dubbed PortDoor, is being used by a probable Chinese advanced persistent threat actor (APT) to target the Russian defense sector, according to researchers. The Cybereason Nocturnus Team observed the cybercriminals specifically going after the Rubin Design Bureau, which designs submarines for the Russian Federation’s Navy. The initial target of the
  5. Stealthy RotaJakiro Backdoor Targeting Linux Systems Previously undocumented and stealthy Linux malware named RotaJakiro has been discovered targeting Linux X64 systems. It has been undetected for at least three years, and operates as a backdoor. Four samples have now been discovered, all using the same C2s. The earliest was discovered in 2018. None of the samples were labeled malware by VirusTotal. The discovery was made by researchers at Chinese security firm Qihoo 360 NETLAB after their BotMon system flagged a suspicious ELF file. Investigation revealed t
  6. Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute Malware Threat actors are increasingly adopting Excel 4.0 documents as an initial stage vector to distribute malware such as ZLoader and Quakbot, according to new research. The findings come from an analysis of 160,000 Excel 4.0 documents between November 2020 and March 2021, out of which more than 90% were classified as malicious or suspicious. "The biggest risk for the targeted companies and individuals is the fact that security solutions still have a lot of problems with detecting malicious
  7. Phishing impersonates global recruitment firm to push malware An ongoing phishing campaign is impersonating Michael Page consultants to push Ursnif data-stealing malware capable of harvesting credentials and sensitive data from infected computers. Michael Page is a world-leading employment agency focused on recruiting at the qualified professional and management level for permanent, temporary, contract, or interim positions. The agency is part of the British-based PageGroup recruitment business with operations in the Americas, UK, Continental Europ
  8. Cybercriminals Using Telegram Messenger to Control ToxicEye Malware Adversaries are increasingly abusing Telegram as a "command-and-control" system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. "Even when Telegram is not installed or being used, the system allows hackers to send malicious commands and operations remotely via the instant messaging app," said researchers from cybersecurity firm Check Point, who have identified no fewer than 130 attacks over the past three months that make use
  9. WhatsApp Pink is malware spreading through group chats If installed; the fake and malicious WhatsApp pink app takes full control of a targeted device. An unusual baiting technique has appeared with the WhatsApp users receiving links that claim to turn the application’s theme from its trademark green to pink. Simultaneously, it also promises ‘‘new features” that have not been specified. Cyber experts have warned users of the messaging application to refrain from opening any such link. The concerning part is that the link has been masked as an official
  10. HackBoss malware poses as hacker tools on Telegram to steal digital coins The authors of a cryptocurrency-stealing malware are distributing it over Telegram to aspiring cybercriminals under the guise of free malicious applications. Researchers have named the malware HackBoss and say that its operators likely stole more than $500,000 from wannabe hackers that fell for the trick. Fake user interface Although there is nothing sophisticated about HackBoss, the scheme proves to be effective as it tempts victims with the prospect of getting hacking tools
  11. Malware Variants: More Sophisticated, Prevalent and Evolving in 2021 A malicious program intended to cause havoc with IT systems—malware—is becoming more and more sophisticated every year. The year 2021 is no exception, as recent trends indicate that several new variants of malware are making their way into the world of cybersecurity. While smarter security solutions are popping up, modern malware still eludes and challenges cybersecurity experts. The evolution of malware has infected everything from personal computers to industrial units since
  12. Crooks abuse website contact forms to deliver IcedID malware Microsoft researchers spotted a malware campaign abusing contact forms on legitimate websites to deliver the IcedID malware. Security experts from Microsoft have uncovered a malware campaign abusing contact forms on legitimate websites to deliver the IcedID malware. Threat actors behind the operation are using contact forms published on websites to deliver malicious links to enterprises using emails with fake legal threats. The emails attempt to trick recipients into clicking a link to review s
  13. Pre-Installed Malware Dropper Found On German Gigaset Android Phones In what appears to be a fresh twist in Android malware, users of Gigaset mobile devices are encountering unwanted apps that are being downloaded and installed through a pre-installed system update app. "The culprit installing these malware apps is the Update app, package name com.redstone.ota.ui, which is a pre-installed system app," Malwarebytes researcher Nathan Collier said. "This app is not only the mobile device's system updater, but also an auto installer known as Android/PUP.Riskware.Autoi
  14. Spy Operations Target Vietnam with Sophisticated RAT Researchers said the FoundCore malware represents a big step forward when it comes to evasion. An advanced cyberespionage campaign targeting government and military entities in Vietnam has been discovered that delivered a remote-access tool (RAT) for carrying out espionage operations, researchers said. Further analysis suggested that this campaign was conducted by a group related to a Chinese-speaking advanced persistent threat (APT) known as Cycldek (a.k.a. Goblin Panda, APT
  15. APT Group Using Voice Changing Software in Spear-Phishing Campaign A sub-group of the 'Molerats' threat-actor has been using voice-changing software to successfully trick targets into installing malware, according to a warning from Cado Security. The Molerats hacking group, also tagged as Gaza Hackers Team, Gaza Cybergang, DustySky, Extreme Jackal, and Moonlight, has been active since at least 2012, mainly targeting entities in the Middle East, but also launching attacks against targets in Europe and the United States. Cado Security says that APT-C-23, belie
  16. Malware hidden in game cheats and mods used to target gamers Image: Fredrick Tendong Threat actors target gamers with backdoored game tweaks and cheats hiding malware capable of stealing information from their systems after infection. The attackers mostly use social media channels and YouTube how-to videos for advertising their malware-laced modding-related game tools. Cisco Talos researchers who spotted this campaign said that they've "seen several small tools looking like game patches, tweaks or modding tools" backdoored with obfuscated malware.
  17. A newly-wormable Windows botnet is ballooning in size Image Credits: Bryce Durbin / TechCrunch Researchers say a botnet targeting Windows devices is rapidly growing in size, thanks to a new infection technique that allows the malware to spread from computer to computer. The Purple Fox malware was first spotted in 2018 spreading through phishing emails and exploit kits, a way for threat groups to infect machines using existing security flaws. But researchers Amit Serper and Ophir Harpaz at security firm Guardicore, which disco
  18. Industrial giant Honeywell says it has ‘returned to service’ after cyber intrusion A worker at a Honeywell International Inc. factory(Photo by BRENDAN SMIALOWSKI/AFP via Getty Images) Honeywell, a Fortune 100 firm that makes aerospace and energy equipment, said Tuesday that malware had disrupted “a limited number” of its computer systems. Honeywell said it had “returned to service” following the incident, but the Charlotte, North Carolina-based firm’s statement did not elaborate on how service was disrupted. A Honeywell spokesperson did not
  19. Researchers Uncover Widely Used Malware Crypter Avast Says OnionCrypter Has Been in Use Since 2016 Security researchers at Avast have discovered that more than 30 hacker groups have been using a malware crypter dubbed OnionCrypter. A crypter is used for encrypting, obfuscating and manipulating malware to make detection more difficult. Hacker groups - including Lokibot, Zeus, AgentTesla and Smokeloader - have been using the recently discovered multilayer OnionCrypter since 2016, Avast says. "Its widespread use and length of time in use make it a ke
  20. ESET Exposes Malware Disguised as Clubhouse App ESET has uncovered malware designed to leverage the growing popularity of invite-only social media app Clubhouse. Revealing its findings in a blog post, the cybersecurity firm said the Trojan malware aims to steal users’ login information for a variety of online services. Disguised as an Android version of the audio chat app (which does not current exist), it is capable of taking credentials for over 450 apps and is also able to bypass SMS-based two factor authentication (2FA). In the scheme, users
  21. New CopperStealer Malware Hijacks Social Media Accounts Proofpoint researchers say it steals logins and spreads more malware. Researchers with Proofpoint released details today on new undocumented malware called CopperStealer. CopperStealer has many of the same targeting and delivery methods as SilentFade, a Chinese-sourced malware family first reported by Facebook in 2019. Proofpoint believes Copperstealer is a previously undocumented family within the same class of malware as SilentFade. The Copperstealer malware attempts to steal the account
  22. Phishing campaign uses US tax season to lure victims Researchers at Cybereason have detected a new campaign targeting US taxpayers with documents that purport to contain tax-related content. These deliver NetWire and Remcos -- two powerful and popular RATs which can allow attackers to take control of the victims' machines and steal sensitive information. The malicious documents used are roughly 7MB in size, which allows them to evade traditional AV mechanisms and heuristic detection. "Social engineering via phishing emails continues to be the preferred
  23. New XcodeSpy malware targets iOS devs in supply-chain attack A malicious Xcode project known as XcodeSpy is targeting iOS devs in a supply-chain attack to install a macOS backdoor on the developer's computer. Xcode is a free application development environment created by Apple that allows developers to create applications that run on macOS, iOS, tvOS, and watchOS. Like other development environments, it is common for developers to create projects that perform specific functions and share them online so that other developers can add them to thei
  24. Report: macOS malware boomed in 2020, but still a fraction of Windows threats A study looking at new malware found in the wild during 2020 says that threats developed for macOS saw a huge jump – almost 1,100% compared to 2019. But taken into context, that total was less than 1% of the new malware that was discovered for Windows in the same period. A new report from Atlas VPN today says that it found a record number of new malware designed for macOS in 2020. Atlas partnered with AV-TEST on the investigation that showed malicious malware for Mac grew on avera
  25. February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown Check Point Research reports that following the international police operation that took control of Emotet in January, Trickbot has become the new top global threat used by cybercriminals Our latest Global Threat Index for February 2021 has revealed that the Trickbot trojan has topped the Index for the first time, rising from third position in January. Following the takedown of the Emotet botnet in January, Check Point researchers report that cyber-criminal groups continue to utilize
×
×
  • Create New...