malware

  1. Father

    RaaS: type of malware and business model of its distribution

    Ransomware-as-a – Service (RaaS, ransomware as a service) is a distribution model for specialized malware that includes all stages: from development to retail implementation via the Darknet and other sales channels. Cryptographers that are used in RaaS can completely paralyze the company's work...
  2. Father

    ZLoader 2.4.1.0: even more features inspired by other popular malware programs

    How did the authors of the "resurrected" downloader surprise researchers this time? The developers of the ZLoader malware, which recently resumed its activity after a two-year hiatus, have implemented a number of new features inspired by the Zeus banking Trojan. Santiago Vicente, a researcher...
  3. Father

    The malware is cleverly hidden in the system, simultaneously disabling any protective mechanisms

    As part of the recent AgentTesla malware distribution campaign, which was reviewed in detail by SonicWall specialists, attackers used VBA macros in Word documents to conduct a file-less injection attack, in which the malicious load is loaded directly into the computer's RAM. The malicious...
  4. Father

    Chinese PlugX malware lurks in your USB devices

    Unit42 Palo Alto Network has discovered a new version of PlugX, which is able to infect and spread via USB devices, replacing ANDROMEDA and Raspberry Robin. Malicious files are hidden using a new technique that works even in the latest Windows OS. The user will not know that their USB device is...
  5. Father

    The GOOSEGG malware is distributed through a breach in Windows Print Spooler

    The cybercrime group Fancy Bear, which in the West is associated with Russia, took advantage of a vulnerability in the Windows print service component to load a previously unknown malware into the system — goosegg. This malware has been active since June 2020 and uses an already fixed bug that...
  6. Father

    Muscovite arrested for trading malware via Telegram

    A resident of the capital faces up to five years in prison. The Federal Security Service of Russia has stopped the activities of a Muscovite who distributed malicious software using the Telegram messenger. According to the special services, a Muscovite born in 1990 was detained, who was...
  7. Father

    Malware developer convicted in Samara region

    During the implementation of operational search activities of the Federal Security Service of Russia in the Samara region, a resident of the region was identified who was involved in the creation, use and distribution of malicious software in order to neutralize anti-virus protection tools. It...
  8. Father

    CISA opens access to the authorities weapon against viruses: Malware Next-Gen is now available to everyone

    Now the tool is available not only for the government, but also for private companies. CISA has announced the launch of a new malware analysis system, Malware Next — Gen, which allows organizations to analyze malware samples and other suspicious artifacts. The service is now available for...
  9. Father

    Check Point unmasked Hackers Responsible for Agent Tesla Malware Campaign

    Who were the mysterious "Gods" and "Bignosa", and how did the researchers manage to calculate them? A recent comprehensive study conducted by Check Point sheds light on the dark side of cyberspace, revealing the activities and identities of attackers using the Agent Tesla malware. Agent Tesla...
  10. Teacher

    MuddyWater changes tactics: legitimate software instead of malware

    File sharing sites are becoming a new attack vector on Israeli companies. The information security company Proofpoint has discovered a new phishing campaign of the Iranian group MuddyWater, during which legitimate software for remote monitoring and management of Atera is distributed among...
  11. Teacher

    Virtual wine – real risks: WINELOADER malware offers diplomats a glass for their safety

    How the ambassadors who decide to participate in the tasting, please in the clutches of spies. An unknown hacker group, dubbed SPIKEDWINE, attacks ambassadors from a number of European countries where Indian diplomatic missions operate. To achieve their goals, attackers use a new malicious...
  12. Teacher

    Chinese PC manufacturer Acemagic confirmed that its devices came with malware

    The Chinese company Acemagic admitted that some of its products were delivered with pre-installed malware. The company explains that they just wanted to reduce the download time and made changes to the Microsoft source code for this purpose. In early February 2024, youtuber The Net Guy...
  13. Teacher

    The era of new cyber heroes: how AI helps in the fight against malware

    AI forces you to rethink your defense strategies. A Los Alamos National Laboratory research team has made a significant breakthrough in cybersecurity, using artificial intelligence to improve malware analysis on a large scale. The developed approach made it possible to significantly advance in...
  14. Teacher

    Hunter-killer: how a simple malware can neutralize firewalls and antivirus programs

    The new generation of malware is aimed not at bypassing detection, but at completely destroying the protection of enterprises. Over the past year, the number of incidents aimed at disabling corporate protection has significantly increased in cyberspace. This is stated in the annual report Red...
  15. Teacher

    Malware won't pass: Google introduces in-depth APK permissions check

    Even the most inexperienced users can no longer be afraid of scammers. Google launching a new pilot program to combat financial fraud, which aims to block the installation of external APKs that request access to risky permissions. APK or Android Package is a file format used for distributing...
  16. Teacher

    FBI Says It has Cleared Hundreds of Routers of Volt Typhoon Malware

    FBI officials said they were able to eliminate the KV botnet used by hackers from the Chinese group Volt Typhoon (aka Bronze Silhouette, DEV-0391, Insidious Taurus and Vanguard Panda) to evade detection during attacks that target critical US infrastructure. It is reported that Volt Typhoon used...
  17. Brother

    MetaStealer from the Ministry of Digital Development: hackers disguise malware as security certificates

    Phishing attacks in Russia are reaching a new level of sophistication. F. A. C. C. T warns of a new wave of targeted phishing attacks on users of state-owned online services in Russia. The attackers send fake emails allegedly from the Ministry of Digital Development of Russia with a request to...
  18. Brother

    WhiteSnake: Malware that can control your computer via Tor

    Why should you be careful when installing PyPI packages? The Fortinet FortiGuard Labs team found malicious packages in the Python Package Index (PyPI) repository that deliver the WhiteSnake Stealer infostiler to Windows systems. Packages containing malware are called nigpal, figflix, telerer...
  19. Brother

    Hackers from China set their sights on the West: what did Blackwood hide in its NSPX30 modular malware?

    Attackers bypass antivirus programs and permanently gain a foothold in their victims systems. The Slovak company ESET discovered the activities of a previously unknown group of hackers associated with China, and assigned it the code name Blackwood. The group has been active since 2018 and...
  20. Brother

    Hackers from China set their sights on the West: what did Blackwood hide in its NSPX30 modular malware?

    Attackers bypass antivirus programs and permanently gain a foothold in their victims ' systems. The Slovak company ESET discovered the activities of a previously unknown group of hackers associated with China, and assigned it the code name Blackwood. The group has been active since 2018 and...
Top