Ransomware Anatova detected in the Netherlands and Belgium
McAfee researchers report they've found a new type of ransomware. The ransomware is aimed at consumers worldwide and is given the name Anatovabased on the name found in the ransomware. Anatova has also been spotted in the Netherlands and Belgium.
Anatova was found in a private peer-to-peer network a... Read more
Experts Palo Alto Networks discover malware for attacking cloud security products
Unit 42, the malware specialists of security specialist Palo Alto Networks, discovered for the first time malware that specifically targets cloud security applications and was able to remove them.
The security applications for public cloud environments no longer appear to be as secure as expected. A... Read more
“GitHub contains most of the malware for cryptographic currency minuses.
Hackers often use legitimate websites like GitHub and Dropbox to spread cryptographic currency denial malware. This is apparent from new research by academics from the Universidad Carlos III de Madrid and King's College London. That's what The Next Web says.
Cryptojackers build special malware dropp... Read more
Google cleans up various apps with stubborn adware
In the first days of 2019, Google removed no less than 85 apps from its Play Store because they were full of adware, according to a blog by security specialist Trend Micro. Android malware therefore remains a major problem this year.
The new year is less than two weeks old and the Google Play Store ... Read more
Phishing tool bypassing two-step verification in Gmail posted on GitHub
A security researcher has published a tool that can bypass various two-step verifications commonly used on platforms such as Gmail and Yahoo. That's what IT Pro says. The tool was placed on GitHub by Polish researcher Piotr Duszy?ski.
The tool was placed along with a step-by-step plan that explains... Read more
New cyber attack infects victims with trojan and ransomware
Cybercriminals have launched a cyber attack that secretly infiltrates systems with malware that steals data. Then ransomware is placed on the infected system. Malwarebytes researchers are writing about the attack.
The campaign uses exploits in Internet Explorer and Flash Player, which were delivered... Read more
New variant Mirai malware abuses weak passwords IoT devices
Trend Micro security researchers have discovered a new variant of the Mirai malware that focuses on IoT devices. The malware, called Miori, wants to integrate those devices into a larger botnet and launch DDoS attacks. That's what Security Intelligence reports.
The malware was discovered at the begi... Read more
Ransomware flattens networks of several major American newspapers
Last weekend, the printing works and deliveries of several large American newspapers came to a standstill. This is due to an attack that may have been carried out with the Ryuk-ransomware. The attack had an impact on, among others, printers of Tribune Publishing, one of the largest publishers of reg... Read more
Hide N Seek botnet infects IoT devices with standard passwords
The Hide 'N Seek botnet continues to grow by infecting vulnerable Internet or Things (IoT) devices that still use their default passwords. That's what Avast security analysts say, SecurityIntelligence reports.
According to Avast, the botnet comes with two important functionalities. The first uses a... Read more
Hackers distribute trojans via Google Cloud storage
A new corporate email campaign spreads malware in the Google Cloud Storage service. The campaign focuses mainly on financial companies, according to ZDNet. The attack was discovered by investigators from Menlo Labs.
The researchers state that they have been studying the so-called BEC-scam for some t... Read more