Jump to content

Search the Community

Showing results for tags 'malware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. 'Ploutus' Malware Targets ATMs in Latin America Malware Infects Itautec-Brand ATMs Used by Many Banks ATMs across Latin America have been persistently targeted over the last eight years by organized criminals seeking to "jackpot" the machines, triggering them to disgorge their cash. The attacks typically involve installing malware directly on an ATM by breaking into the device's cabinet to gain direct access to its physical ports and drives. In the early days, around 2013, this involved using a CD boot disk to install the malware, dubbed Ploutus
  2. Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads. "The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft," Sophos researchers Gabor Szappanos and Andrew Brandt said in a write-up published today. "In recent years, almost as much effort has gone into improvement of its delivery method as has gone into
  3. Go Malware Detections Increase 2000% New malware written in the Go programming language has spiked by 2000% over the past four years, as nation state and cybercrime threat actors switch from older ecosystems, according to a new report. Israeli security firm Intezer made the claims in a new report late last week, Year of the Gopher: 2020 Go Malware Round-Up. It revealed that although the language, sometimes referred to as Golang, was first used for malware around nine years back, it took until 2019 for it to become popular among cyber-criminals.
  4. Updated Minebridge RAT Targets Security Researchers Zscaler: Malware Buries Itself Into TeamViewer Attack flow for Mindbridge malware (Source: Zscaler) The operators behind the Minebridge remote-access Trojan have updated the malware, which is targeting security researchers using a malicious payload disguised in an attached resume document, according to the security firm Zscaler. The newly discovered version of the RAT is embedded in macro-based Word document file. When a recipient clicks on the malicious link, Minebridge buries itself into the re
  5. Cloud apps are increasingly being used to deliver malware More than half of all malware is now delivered using cloud apps (Image credit: Andriano.cz / Shutterstock) As businesses continue to move more of their workloads to the cloud, cybercriminals are increasingly using cloud apps to deliver malware in an effort to evade legacy security defenses, according to new research from Netskope. To compile the February 2021 edition of its Cloud and Threat Report, the firm used anonymized data fro
  6. 20 Common Tools & Techniques Used by macOS Threat Actors & Malware In a recent two-part series of blog posts on Medium, Nasreddine Bencherchali took to exploring some of the common tools and techniques used by threat actors and malware targeting the Windows platform, with a particular focus on LOLBins or “Living off the Land binaries”. It’s such an excellent guide for threat hunting and compiling detection rules for Windows that we thought: “wouldn’t it be cool to have a similar guide for macOS malware?” Looking back at campaigns directly targeting
  7. Malware Is Now Targeting Apple’s New M1 Processor Two distinct strains of malware have already adjusted to the new silicon just months after its debut. Just as legitimate software developers have adjusted to Apple's ARM transition, so too have malware distributors.Photograph: Apple Mac malware has always been less common than its Windows-targeting counterparts, but in recent years the threat to Apple computers has gone mainstream. There's adware and even ransomware tailo
  8. Android Devices Hunted by LodaRAT Windows Malware The LodaRAT – known for targeting Windows devices – has been discovered also targeting Android devices in a new espionage campaign. A newly discovered variant of the LodaRAT malware, which has historically targeted Windows devices, is being distributed in an ongoing campaign that now also hunts down Android devices and spies on victims. Along with this, an updated version of LodaRAT for Windows has also been identified; both versions were seen in a recent campaign targeting Bangl
  9. The Great Suspender extension has been removed from Chrome Web Store for containing malware This afternoon, Google has delisted the popular extension The Great Suspender for containing malware and is proactively disabling the extension for those who have it. The Great Suspender is — or perhaps was — an extension that forced your excess tabs to sleep, helping to keep Chrome from using too much RAM and other resources. Last year, as explained in-depth by TheMageKing, the development of The Great Suspender changed hands and was subsequently sold to an unknown
  10. Newly detected malware targets Kubernetes clusters for cryptocurrency mining A newly detected form of malware has been detected in the wild, targeting Kubernetes clusters for cryptocurrency mining. Detailed today by security researchers at Palo Alto Networks Inc.’s Unit 42, the malware, dubbed “Hildegard,” was first detected in January and is believed to have been designed by the TeamTNT threat group. Hildegard targets Kubernetes clusters via a misconfigured kubelet, the primary node agent that runs on each Kubernetes node. Having gained access,
  11. New Linux malware steals SSH credentials from supercomputers A new backdoor has been targeting supercomputers across the world, often stealing the credentials for secure network connections by using a trojanized version of the OpenSSH software. The malware is not widespread and appears to target mostly high-performance computers (HPC) and servers on academic and research networks. Multiplatform, high-profile targets Security researchers at cybersecurity company ESET discovered the malware and named it Kobalos, after the misbehaving creature in Gree
  12. The Drovorub Mystery: Malware NSA Warned About Can't Be Found NSA and FBI Released Detailed Information on Drovorub Linux Malware, But Major Cybersecurity Firms Found No Samples A piece of malware linked by U.S. intelligence agencies to hackers believed to be backed by the Russian government remains a mystery to the private sector, which apparently hasn’t found a single sample of the malware, and one researcher went as far as suggesting that it may be a false flag set up by the United States itself. In August 2020, the NSA and the FBI released a joint
  13. Emotet, NetWalker and TrickBot have taken big blows, but will it be enough? (Getty Images) A trio of operations meant to disrupt ransomware outfits in recent months — two of which came to light this week — could have lasting impacts even if they stop short of ending the threat, security experts say. Researchers are still sizing up the effects of recent busts of the Emotet and NetWalker gangs, but those operations have the potential to be more potent than last fall’s maneuvers against the TrickBot ransomware. In research out Friday, Menlo Se
  14. Is Trickbot Botnet Making a Comeback? Researchers: Phishing Campaign Targeting Insurance and Legal Industries Part of the malicious domain used in recent Trickbot campaign (Source: Menlo Security) The Trickbot botnet appears to be making a comeback this month with a fresh campaign that is targeting insurance companies and legal firms in North America, according to an analysis published Friday by Menlo Security. While the phishing campaign that started Jan. 12 contains some of the hallmarks of a Trickbot campaign, Vinay Pidathala, director of secur
  15. Linux malware uses open-source tool to evade detection Image: Moritz Kindler AT&T Alien Labs security researchers have discovered that the TeamTNT cybercrime group upgraded their Linux crypto-mining with open-source detection evasion capabilities. TeamTNT is mostly known for targeting and compromising Internet-exposed Docker instances for unauthorized Monero (XMR) mining. However, the group has also shifted tactics by updating its Linux cryptojacking malware named Black-T to also harvest user credentials from infected servers.
  16. Emotet botnet disrupted after global takedown operation The infrastructure of today's most dangerous botnet built by cybercriminals using the Emotet malware was taken down following an international coordinated action coordinated by Europol and Eurojust. The joint effort between law enforcement agencies and authorities from Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, Canada, and Ukraine allowed investigators to take control of the botnet's servers and disrupt the malware's operation. Following a global investi
  17. Malware found on laptops given out by government Some of the laptops given out in England to support vulnerable children home-schooling during lockdown contain malware, BBC News has learned. Teachers shared details on an online forum about suspicious files found on devices sent to a Bradford school. The malware, which they said appeared to be contacting Russian servers, is believed to have been found on laptops given to a handful of schools. The Department for Education sai
  18. FreakOut malware exploits critical bugs to infect Linux hosts An active malicious campaign is currently targeting Linux devices running software with critical vulnerabilities that is powering network-attached storage (NAS) devices or for developing web applications and portals. The purpose is to infect machines with vulnerable versions of the popular TerraMaster operating system, the Zend Framework (Laminas Project), or Liferay Portal with FreakOut malware, which can help deploy a wide variety of cyberattacks. Hitting unpatched Linux systems The co
  19. Malware incidents on remote devices increase 52% of organizations experienced a malware incident on remote devices in 2020, up from 37% in 2019, a Wandera report reveals. Of devices compromised by malware in 2020, 37% continued accessing corporate emails after being compromised and 11% continued accessing cloud storage, highlighting a need for organizations to better determine how to configure business tools to ensure fast and safe connectivity for all users in 2021. Other findings In 2020, 28% of organizations were regularly utilizing an operat
  20. Introducing Malvuln.com – the first website ‘exclusively dedicated’ to revealing security vulnerabilities in malware One security researcher is turning the tide on attackers by posting high-impact zero-day vulnerabilities in the very malware that underpins their campaigns A pioneering malware vulnerability database has become a surprise addition to security pros’ defensive toolkits as they seek to disrupt, remediate, or attribute cyber-attacks. Launched on January 2, Malvuln.com provides exploit code for security flaws in malicious software in the same
  21. “Oski Stealer” Is a Widely-Used Cheap Yet Powerful Malware The “Oski Stealer” is getting more popular, as it’s a bargain for what it can do. The malware appears to be of Russian origin, and it’s mainly used by actors of the associated countries. Oski can steal sensitive information and credentials from over 60 different applications. There’s a piece of malware that has created some frenzy on the Russian parts of the dark web named “Oski Stealer.” The credential-stealing malware first appeared in November 2019, so it’s not exactly new, but it
  22. December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat Our latest Global Threat Index for December 2020 has revealed that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and was linked to a wave of ransomware attacks. But in November it was much less prevalent, dropping to 5th place in the Index. It has
  23. Hackers Using Fake Trump's Scandal Video to Spread QNode Malware Cybesecurity researchers today revealed a new malspam campaign that distributes a remote access Trojan (RAT) by purporting to contain a sex scandal video of U.S. President Donald Trump. The emails, which carry with the subject line "GOOD LOAN OFFER!!," come attached with a Java archive (JAR) file called "TRUMP_SEX_SCANDAL_VIDEO.jar," which, when downloaded, installs Qua or Quaverse RAT (QRAT) onto the infiltrated system. "We suspect that the bad guys are attempting to ride the frenzy brou
  24. Cross-platform ElectroRAT malware drains cryptocurrency wallets Security researchers have discovered a new remote access trojan (RAT) used to empty the cryptocurrency wallets of thousands of Windows, Linux, and macOS users. Named ElectroRAT after being discovered in December, the cross-platform RAT malware is written in Golang and it was used as part of a campaign that has been targeting cryptocurrency users since the start of 2020. Thousands infected within a year The attackers behind the ElectroRAT operation created and injected their RAT into cu
  25. Malware uses WiFi BSSID for victim identification Malware authors are using the WiFi AP MAC address (also known as the BSSID) as a way to geo-locate infected hosts. Image: Stephen Phillips Malware operators who want to know the location of the victims they infect usually rely on a simple technique where they grab the victim's IP address and check it against an IP-to-geo database like MaxMind's GeoIP to get a victim's approximate geographical location. While the technique isn't very accurate, it is still the most reliable method of determining a us
×
×
  • Create New...