Browsing Category: Malware

trojan horse snow

Dyreza Banker Trojan Attackers Exploiting CVE-2014-4114 Windows Flaw

The Dyreza Trojan is exploiting the recently disclosed CVE-2014-4114 vulnerability in Windows that was first used by the Sandworm attackers.

Read more...

scada

BlackEnergy Malware Used in Attacks Against Industrial Control Systems

Attackers are using BlackEnergy malware to attack HMI software running inside industrial control systems, according to an advisory from ICS-CERT.

Read more...

IE 0day watering hole

Four Distinct Watering Hole Attacks Dropping ScanBox Keylogger

PwC has published research on four watering hole attacks likely carried out by different attackers, all connected by the ScanBox JavaScript-based reconnaissance tool.

Read more...

shutterstock_105196211

Russian APT28 Group Linked to NATO, Political Attacks

APT28, a Russian hacking group, has been tied to attacks against the country of Georgia, Eastern European political and military organizations, and NATO, a report from FireEye said.

Read more...

tor_clickfraud

Researcher Finds Tor Exit Node Adding Malware to Binaries

A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan[...]

Read more...

router_generic

NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk

More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.

Read more...