Quantcast
Channel: Malware – Zerosecurity
Browsing all 58 articles
Browse latest View live

Malware on a steep Incline during first quarter

Malware development shattered all records in the first quarter of 2014, with a number of over 15 million fresh samples, and over 160,000 new samples showing up daily, based on a report from cloud-based...

View Article


StealRAT pops back up in 2014

StealRAT was more of a botnet that piggy backed onto many breached WordPress sites back in July of 2013.  StealRAT is a advancement in mass-mailing or spamming.  As new spam detection is released and...

View Article


Poweliks – Malware that drops no files

A new piece of malware referred to as Poweliks tries to evade detection and analysis by operating completely from your system registry without having files on the disk, security researchers alert. The...

View Article

Gameover Zeus Variant is back

Analysis released today from Arbor Networks reveals that cybercriminals powering GameOver Zeus, that was taken down by law enforcement in early June, have restored the botnet with at the least 12,353...

View Article

Cryptolocker being spread on Youtube ADs

Cryptolocker is now being spread around YouTube by vxers who’ve purchased advertising space, researchers Vadim Kotov and Rahul Kashyap have discovered. The researchers made the discovery while checking...

View Article


Malvertising Attack Targets High-Profile Sites

In accordance with analysts, the malicious (malvertising) advertising campaign has impacted popular sites including Java.com, TMZ.com, DeviantArt.com, Photobucket.com, eBay.ie, IBTimes.com, TVgids.nl...

View Article

Bifrose Variant utilizes Tor

Tor (The Onion Router) is a network of computers built to anonymize transmissions between two parties by concealing their whereabouts. It’s typically utilized to combat censorship and to defend the...

View Article

New Tiny Banker Malware Actively Targeting Banks

Researchers have identified a banking trojan, named ‘Tinba’ or ‘Tiny Banker,’ has been targeting innocent customers of at least 26 different banking institutions globally. In accordance with security...

View Article


Was Backoff POS Malware Responsible for Home Depot Breach?

“Backoff” is a family of PoS malware and has been discovered recently. The malware family has been witnessed on at least three separate forensic investigations. Researchers have identified three...

View Article


Torrentlocker Malware Impacts the Netherlands

The Netherlands has been hit with a brand new spam campaign intended to spread a cryptolocker variant named torrentlocker, which started Monday October 13th 2014. The torrentlocker seems to present...

View Article

DMA Locker 4.0 preparing to launch its campaign

Cyber criminals are trying to make money from the typically soft target healthcare has displayed because of its overall weak security. Hasherezade, a security researcher at Malwarebytes said the DMA...

View Article

Coders of Nuclear Exploit kit making large profits

Based on Check Point’s analysis of the Nuclear Exploit kit (EK), the coders are estimated to earning over $100,000 every month. Renting out exploit kits is nothing new, for example the Blackhole EK was...

View Article

ZCrypt ransomware on the rise warns Microsoft

Microsoft has put out a warning of the ZCrypt ransomware that also has worm-like attributes.  It’s currently infecting removable drives on operating systems below Windows 10. Worm attributes? ZCrypt is...

View Article


Irongate ICS Malware targeting SCADA Systems

FireEye experts have released their discoveries on the Irongate ICS/SCADA malware, which targets a Siemens PLC simulation (SIM) environment via a man-in-the middle attack on a particular component of...

View Article

Cryptolocker ransomware infects 10,000 Australians

About 10,000 Australians have already been targeted in a Cryptolocker ransomware campaign that persuades individuals with an email that seems to come from local energy company AGL, as reported by the...

View Article


Angler Exploit Kit remains undetected

Angler exploit kit first showed up in late 2013, and ever since then has dramatically gained popularity on underground forums. Its ambitious tactics for avoiding detection by security applications have...

View Article

New FastPOS malware targeting Point-of-Sale systems

Experts have disclosed a new category of malware, labeled “FastPOS,” that has the ability to quickly extract stolen credit card details. Different from most POS malware, FastPOS concentrates on copying...

View Article


Healthcare sector hit by advanced worms, infects MRI and x-ray machines

MRI, x-ray, and an oncology machines were all found containing malware with code to install backdoors on other connected systems for the purpose of lifting data off the machines. Security experts at...

View Article

EasyDoc malware infects Macs and routes through TOR

Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc...

View Article

Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

View Article
Browsing all 58 articles
Browse latest View live