Botnet with million infected computers taken over
The French police have taken over and neutralised a large botnet for cryptographic currency mining. The botnet managed nearly a million infected computers.
It was the Retadup malware, writes Techcrunch. This malware infects computers and then uses processor power to minimize cryptographic currency. ... Read more
Mining malware switches from Arm-IoT to Intel servers
A mining malware previously only seen on Arm-controlled Internet or Things (IoT) devices has made the switch to Intel systems. That's what security investigator Larry Cashdollar of Akamai discovered.
Cashdollar states that one of its honeypot systems has recently discovered an IoT malware that seems... Read more
Android app with more than 100 million downloads spread malware
The CamScanner app for Android included a so-called Trojan Dropper, a module that installed malware on infected devices. The Trojan Dropper was implemented in the app in an advertising library.
Ars Technica reports that CamScanner was a perfectly normal app for most of its lifespan. Among other t... Read more
“Almost three quarters of new domain names are harmful.
A study by Palo Alto Networks shows that Newly Registered Domains (NRDs) are used with malicious intent or are 'not safe for work' (NSFW) in 70 percent of the cases. The company will report this in a report on Tuesday.
Palo Alto reports that this is almost ten times as much as the malicious domai... Read more
“Uploading to malware-scanning websites leads to data leaks.
Companies accidentally leave confidential files on the Internet that are open for third parties to download. This is done by uploading files to malware-scanning websites, which then publish everything.
White-hat hackers at security company Cyjax report that, for example, IT personnel and security... Read more
“Pen tests regularly cause leaks of sensitive data
According to BlackBerry Cylance research, pen tests regularly lead to the leakage of sensitive information. The company's research team was able to find confidential information about air traffic control in a semi-public malware environment, among other things.
In the report, called "Thin Red Line: ... Read more
Number of cyber attacks reached record heights in the past quarter
Attack traffic reached a record high in the second quarter of 2019. That's what Fortinet's Global Threat Landscape Report says. Attack traffic increased by almost 4 percent compared to the same period a year earlier.
Especially in the area of malware and exploits there was more activity, according t... Read more
More than 7.4 million Android devices contain pre-installed malware
Pre-installed malware was found on more than 7.4 million Android devices. The malware was able to take over devices, download apps in the background and commit advertising fraud.
The find was made by researchers from Google itself. The malware ended up on devices through the manufacturers of the pho... Read more
Kaspersky: Sodin-ransomware used zero day in Windows and CPU architecture
The ransomware Sodin uses a zero day leak in Windows to obtain access rights to infected systems. In addition, it uses the CPU architecture to prevent detection. According to Kaspersky researchers, this is hardly ever the case with ransomware.
The Sodin malware is a Ransomware-as-a-Service, which me... Read more