Browsing Category: Malware

blackhatlobby

Podcast: Threatpost Previews Black Hat 2014

In this special edition of the Digital Underground Podcast, Dennis Fisher interviews fellow Threatpost editor Mike Mimoso and also Threatpost reporter Brian Donohue about the Black Hat security conference, which begins this week in Las Vegas. Topics of discussion include Chris Valasek and Charlie Miller hacking automobiles, Jeff Forristal’s briefing on what promises to be a devastating Android vulnerability, why it’s dumb to host Black Hat in Las Vegas in the dead of summer, and more.

Read more...

shutterstock_177915284

Citadel Malware Variant Allows Attackers Remote Access, Even After Removal

Categories: Malware

A new variant of the Citadel banking Trojan has been discovered where the attackers are using Windows remote shell commands to be enable Remote Desktop Protocol access, even if the malware is discovered and removed.

Read more...

point of sale security

New Backoff PoS Malware Identified in Several Attacks

A new breed of point-of-sale malware has been found in several recent attacks, and experts say that the tool, known as Backoff, has extensive data stealing and exfiltration capabilities, including keylogging, memory scraping and injection into running processes.

Read more...

yeti

Crouching Yeti APT Campaign Stretches Back Four Years

Categories: Hacks, Malware, Web Security

A new analysis of a long-term APT campaign targeting manufacturers, industrial, pharmaceutical, construction and IT companies in several countries has uncovered fresh details of the attack, including identification of nearly 3,000 victims and the unmasking of the command-and-control infrastructure.

Read more...

android garden

Critical Android FakeID Bug Allows Attackers to Impersonate Trusted Apps

There is a critical vulnerability in millions of Android devices that allows a malicious app to impersonate a trusted application in a transparent way.

Read more...

Koler popups

Koler Ransomware Infrastructure Complex and Agile

Categories: Malware, Mobile Security

Researchers at Kaspersky Lab report on the infrastructure supporting the Koler ransomware, which not only has components targeting Android devices, but also redirects desktop browsers to other ransomware and exploit kits.

Read more...

onion

More Details of Onion/Critroni Crypto Ransomware Emerge

New ransomware has been dubbed Onion by researchers at Kaspersky Lab as its creators use command and control servers hidden in the Tor Network (a/k/a The Onion Router) to obscure their malicious activity.

Read more...