Researchers at Kaspersky Lab and Microsoft have shared new insight into how malware campaigns operate over the Tor anonymity network, as well as other darknets.
Browsing Category: Malware
Researchers have discovered a recent campaign that leveraged a Pony botnet controller to steal over $200,000 in Bitcoin and other virtual currencies along with 700,000 user credentials.
A new piece of ransomware known as BitCrypt is deploying a brand of encryption that is incredibly weak and easily broken.
There are at least two different groups running attacks exploiting the recently published zero day vulnerability in Internet Explorer 10, and researchers say one of the groups used the bug to impersonate a French aerospace manufacturer and compromise victims visiting the spoofed Web page.
Less than a week after the Moon worm, new and unrelated vulnerabilities have been reported in Linksys home and small office routers. Hackers can use a simple exploit to gain remote access to the boxes.
A new campaign, dubbed Operation SnowMan, was been spotted leveraging a previously unknown zero-day in Internet Explorer 10 after the U.S. Veterans of Foreign Wars’ website was compromised this week.
A list of almost 8,000 credentials for FTP sites is circulating on the black market; the list includes high profile targets that are at risk for compromise.
A worm is spreading on a number of home and small business routers manufactured by Linksys. Researchers at the SANS Institute have not been able to determine whether there is a malicious payload or learn much about command and control.
OSX/CoinThief, a Trojan that steals Bitcoin wallet credentials and Bitcoin-QT keys has been found on download sites MacUpdate.com and Download.com.
Implementing an effective detection system for attacks against cars may wind up being far more difficult than expected.