Hackers behind the $81 million heist in February at Bangladesh Bank used stolen credentials to access the financial institution’s SWIFT payment system and a malware toolkit to cover their tracks.
Browsing Category: Malware
Was the Federal Bureau of Investigation justified in paying over $1.3 million for a hacking tool that opened the iPhone 5c of San Bernardino terrorist?
A report released Thursday shines a bright light on point-of-sales system attack targeting hospitality and retail businesses that could have earned cyber crooks a $400 million payday.
In this Threatpost op-ed, Dave Dittrich and Katherine Carpenter explain the dangers of conflating measurable events, or observables, with indicators of compromise, which require context and other constructs to provide true threat intelligence.
Researchers at Endgame have found new versions of TeslaCrypt in the past few weeks that target a host of new and unusual file extensions, and deploy new obfuscation and evasion techniques.
Researcher Patrick Wardle has developed a utility called RansomWhere? that he released today that he says does generic ransomware detection on OS X.
Tibetans along with journalists and human rights workers in Hong Kong and Taiwan have been targeted in campaigns using phishing emails laced with Microsoft RTF attachments that exploit four vulnerabilities.
Cisco Talos said that 3.2 million servers are vulnerable to the JBoss flaw used as the initial point of compromise in the recent SamSam ransomware attacks.
Mike Mimoso and Chris Brook recap the news of the week, including the Badlock bust, encryption legislation, and cryptoworm ransomware. Mike also discusses last week’s Infiltrate Con.