malware

  1. Teacher

    Virtual wine – real risks: WINELOADER malware offers diplomats a glass for their safety

    How the ambassadors who decide to participate in the tasting, please in the clutches of spies. An unknown hacker group, dubbed SPIKEDWINE, attacks ambassadors from a number of European countries where Indian diplomatic missions operate. To achieve their goals, attackers use a new malicious...
  2. Teacher

    Chinese PC manufacturer Acemagic confirmed that its devices came with malware

    The Chinese company Acemagic admitted that some of its products were delivered with pre-installed malware. The company explains that they just wanted to reduce the download time and made changes to the Microsoft source code for this purpose. In early February 2024, youtuber The Net Guy...
  3. Teacher

    The era of new cyber heroes: how AI helps in the fight against malware

    AI forces you to rethink your defense strategies. A Los Alamos National Laboratory research team has made a significant breakthrough in cybersecurity, using artificial intelligence to improve malware analysis on a large scale. The developed approach made it possible to significantly advance in...
  4. Teacher

    Hunter-killer: how a simple malware can neutralize firewalls and antivirus programs

    The new generation of malware is aimed not at bypassing detection, but at completely destroying the protection of enterprises. Over the past year, the number of incidents aimed at disabling corporate protection has significantly increased in cyberspace. This is stated in the annual report Red...
  5. Teacher

    Malware won't pass: Google introduces in-depth APK permissions check

    Even the most inexperienced users can no longer be afraid of scammers. Google launching a new pilot program to combat financial fraud, which aims to block the installation of external APKs that request access to risky permissions. APK or Android Package is a file format used for distributing...
  6. Teacher

    FBI Says It has Cleared Hundreds of Routers of Volt Typhoon Malware

    FBI officials said they were able to eliminate the KV botnet used by hackers from the Chinese group Volt Typhoon (aka Bronze Silhouette, DEV-0391, Insidious Taurus and Vanguard Panda) to evade detection during attacks that target critical US infrastructure. It is reported that Volt Typhoon used...
  7. Brother

    MetaStealer from the Ministry of Digital Development: hackers disguise malware as security certificates

    Phishing attacks in Russia are reaching a new level of sophistication. F. A. C. C. T warns of a new wave of targeted phishing attacks on users of state-owned online services in Russia. The attackers send fake emails allegedly from the Ministry of Digital Development of Russia with a request to...
  8. Brother

    WhiteSnake: Malware that can control your computer via Tor

    Why should you be careful when installing PyPI packages? The Fortinet FortiGuard Labs team found malicious packages in the Python Package Index (PyPI) repository that deliver the WhiteSnake Stealer infostiler to Windows systems. Packages containing malware are called nigpal, figflix, telerer...
  9. Brother

    Hackers from China set their sights on the West: what did Blackwood hide in its NSPX30 modular malware?

    Attackers bypass antivirus programs and permanently gain a foothold in their victims systems. The Slovak company ESET discovered the activities of a previously unknown group of hackers associated with China, and assigned it the code name Blackwood. The group has been active since 2018 and...
  10. Brother

    Hackers from China set their sights on the West: what did Blackwood hide in its NSPX30 modular malware?

    Attackers bypass antivirus programs and permanently gain a foothold in their victims ' systems. The Slovak company ESET discovered the activities of a previously unknown group of hackers associated with China, and assigned it the code name Blackwood. The group has been active since 2018 and...
  11. Brother

    Анализ C2-сервера SystemBC Malware выявляет хитрости доставки полезной нагрузки

    Исследователи кибербезопасности пролили свет на командно-контрольный сервер (C2) известного семейства вредоносных программ под названием SystemBC. "SystemBC можно приобрести на подпольных торговых площадках и поставляется в архиве, содержащем имплантат, сервер командования и управления (C2) и...
  12. Brother

    Descendants of the family: Kasseika made it impossible to analyze malware

    What does the band have in common with the legendary BlackMatter? Cybersecurity company Trend Micro has discovered that in 2023, the Kasseika ransomware group joined an increasing number of cybercrime groups using the BYOVD (Bring Your Own Vulnerable Driver) tactic, which allows attackers to...
  13. Brother

    Voronovo resident detained for developing malware

    A resident of Voronovo is accused of developing malicious computer programs. The details were reported by the telegram channel “102. Neman" Department of Internal Affairs of the Grodno Regional Executive Committee. It was established that a 35-year-old Belarusian received an order via the...
  14. Brother

    Water Curupira uses PikaBot malware to deploy ransomware

    Experts attribute this activity to the termination of QakBot in August. Trend Micro has recorded an active distribution of the PikaBot malware by the Water Curupira group. Operations began in the first quarter of 2023 and continued until the end of June, before resuming in September. PikaBot...
  15. Brother

    Full control and theft of funds: Android malware Chameleon has become even more dangerous

    In the new iteration, the banking Trojan has received qualitatively new attack capabilities. Cybersecurity researchers discovered a new version of the Android Trojan for Android called Chameleon, which is aimed primarily at European users of banking applications. The new version of the mobile...
  16. Brother

    Return of QakBot: hotel business became the first victim of the updated malware

    Attackers are testing a new version with some changes. QakBot malware is once again being used in phishing campaigns, despite the successful operation of law enforcement agencies "Duck Hunt" to eliminate the QakBot infrastructure. QakBot (Qbot) started out as a banking Trojan in 2008. Malware...
  17. Brother

    VirusTotal Report: AI is 70% more effective in detecting malware

    The company explained how much neural networks have overtaken the capabilities of modern threat analysis. The VirusTotal presented a new study that actively examines the possibilities of using large language models, including neural networks, to detect and automatically analyze malicious code...
  18. T

    Ransomware PHOBOS

    SALE RANSOMWARE PHOBOS - Адмпанель в TOR, круглосуточный сапорт. - 80/20 в вашу сторону. - Полностью оффлайн. - Для работы не требует подключения к интернету, не отправляет статистику. - При выключении и повторном включении ПК или его перезагрузке, софт автоматически проверит...
  19. Carding 4 Carders

    Wiki-Slack: How Wikipedia Helps Spread malware in Work Chats

    Developers should clearly teach the Slack messenger to format text correctly. Cybersecurity specialists from the eSentire Threat Response Unit have identified an interesting technique for cyber attacks on employees of companies that use the corporate messenger Slack. The method is called...
  20. Carding 4 Carders

    Advertising Android malware from the Play Store penetrated 2 million devices

    Several malicious Android apps hosted on the Google Play Store have made their way to more than two million mobile devices. Their task is to display intrusive advertising, hiding their presence in the system. Dr. Web specialists told Advara about the latest kit. According to them, these apps...
Top