Malware - Свежие новости [ Фото в новостях ] | |
Meet Panda, an illicit cryptocurrency mining crew terrorizing organizations worldwide
Cybersecurity researchers have profiled a hacking crew named “Panda” believed to have amassed roughly $90,000 worth of cryptocurrency via remote access tools (RATs) and illicit mining malware. The Cisco Talos Intelligence Group noted that while Panda isn’t exactly sophisticated, it has persisted as one of the internet’s most active attackers in recent years. дальше »
2019-9-18 15:12 | |
Monero-mining Panda threat group resurfaces as Cisco’s Talos research team identify latest attack
The Panda threat group responsible for the “MassMiner” cryptomining malware attack in 2018, has resurfaced. The Monero mining group make use of remote access tools (RATs) and various other crypto-mining malwares to access and exploit vulnerable computers for mining cryptocurrencies. дальше »
2019-9-18 14:00 | |
New Linux Malware Mines Cryptos By Using Backdoor: Latest TrendMicro Research
For a long time, Linux users were happy to be free of most malware. Unfortunately, we have been seeing some malware focused on them lately. The latest threat was discovered by TrendMicro and it is called Skidmap. дальше »
2019-9-17 03:00 | |
New Linux malware mines crypto after installing backdoor with secret master password
Cybersecurity researchers have identified a new strain of Linux malware that not only mines cryptocurrency illicitly, but provides the attackers with universal access to an infected system via a “secret master password. дальше »
2019-9-16 17:42 | |
Google purges 24 malware-ridden apps that were downloaded 500,000 times
Android just can’t seem to shake off its malware issues. A new malware campaign targeting Android has been found to engage in ad fraud at least since early June 2019. The findings, disclosed by cybersecurity firm CSIS Security Group, reveal that the malware — called Joker — is designed to surreptitiously sign users up for premium service subscriptions, in addition to stealing the victim’s SMS messages, the contact list, and device information. дальше »
2019-9-10 10:46 | |
Apple claps back at Google for spreading FUD in iOS exploit report
It was just last week that we covered a report by Google‘s Project Zero security researchers claiming they’d identified a malware campaign targeting iPhones for “at least two years. ” When successful, the exploit chain allowed iPhones to be compromised with no interaction from the user beyond visiting a malicious website. дальше »
2019-9-7 23:09 | |
Nasty Glupteba malware uses Bitcoin blockchain to keep itself alive
Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies. дальше »
2019-9-4 17:09 | |
Pirated textbooks & essays are full of malware
It’s not easy being a student nowadays. Sure, your parents could cover tuition with a summer job, but things are different now. Modern-day university students contend with high fees, overpriced rents, and yes, sky-high textbook charges. дальше »
2019-9-4 00:17 | |
Surveillance campaign targeting Uyghur Muslims affected not just iOS, but Android too
The malware campaign targeting the Uyghur Muslim minority in China’s autonomous region of Xinjiang may have been more extensive than previously thought. According to a new report published by Washington, DC-based cybersecurity firm Volexity, the community has been been at the receiving end of a large-scale surveillance operation via “strategically compromised websites” and mobile devices running not just iOS, but also Android. дальше »
2019-9-3 14:31 | |
Google researchers reveal data-stealing, web-based iPhone exploit that was active for years
Researchers from Google have uncovered what appears to be a concentrated malware campaign targeting iPhones for at least two years. Thankfully, this may be over now, although they warn it’s possible there are others that are yet to be seen. дальше »
2019-8-30 10:02 | |
French Cops Trick Monero Cryptomining Botnet to Self-Destruct on 850,000 Computers
The Retadup malware which had been deployed on hundreds of thousands of computers around the world to secretly mine the Monero cryptocurrency and commit other illegal acts may finally be over. According to the BBC, the backend infrastructure of the Retadup Monero cryptojacker which is estimated to have infected over 850,000 computers across the globe […] The post French Cops Trick Monero Cryptomining Botnet to Self-Destruct on 850,000 Computers appeared first on CCN Markets дальше »
2019-8-30 15:39 | |
Malware found in CamScanner’s document scanning Android app, which has over 100M downloads
Another day, another instance of Android malware found on the Google Play app store. Researchers from Kaspersky Lab said they found an app with 100 million downloads that housed a malicious module that then pushed ads or downloaded apps surreptitiously onto compromised Android devices. дальше »
2019-8-28 10:07 | |
Fortnite Gamers Get Threatened By New Crypto-Stealing Ransomware, ‘Syrk’ via Hidden-Cry Program
Cybercriminals are always on the lookout for new victims and it looks like Fortnite players are their most recent choice. New ransomware called Syrk is currently targeting players and encrypting files if the ransom is not paid. дальше »
2019-8-27 23:42 | |
Hackers behind Texas ransomware attacks want $2.5 million
The threat actor behind the coordinated ransomware attack against multiple Texas local governments may have gained access to its computer systems via a third-party software provider. According to NPR, which first reported the development, the attackers want a collective ransom of $2. дальше »
2019-8-23 15:22 | |
Programmer Discovers Cryptojacking Malware on GitHub
Juskoljo, a GitHub user who has eight repositories on the platform, has discovered malicious cryptojacking malware in 11 code libraries for the Ruby programming language. The libraries containing the deadly malware have reportedly been downloaded nearly four thousand times, according to reports on August 21, 2019. дальше »
2019-8-23 23:00 | |
Open-source spyware bypasses Google Play defenses — twice
Google Play Store continues to attract sketchy Android apps despite its best efforts to vet incoming apps for malware. In a new report published by security firm ESET, researchers have discovered the first known instance of an open-source spyware bypassing the internet giant’s app store vetting process — twice. дальше »
2019-8-22 15:57 | |
Cryptojacking malware found in 11 RubyGem language repositories
Malware designed to surreptitiously infect victims’ computer systems and mine cryptocurrency on behalf of hackers has been found in 11 code libraries on programming language manager RubyGems. Hackers exploited RubyGems – a package manager for the Ruby programming language that devs use to upload and distribute new versions of software – by downloading Ruby libraries, adding the malicious code, and re-uploading them under new names Decrypt reports. дальше »
2019-8-22 10:20 | |
Researcher discloses second Steam zero-day exploit after being shut out of bug bounty program
A second zero-day vulnerability has been publicly disclosed in the Steam gaming client by security researcher Vasily Kravets after he said he was banned from its bug-bounty program. The revelations come two weeks after another zero-day previously disclosed by Kravets and researcher Matt Nelson was disputed by Valve, Steam’s parent company. дальше »
2019-8-22 09:52 | |
Report: Researchers Discover New Cryptojacking Malware for Mining Monero
Varonis, a data security and analytics company, has discovered new strains of cryptojacking malware that hijacks a victim’s computer resources to mine monero (XMR), and a mysterious web shell while investigating the cause of a cryptomining infection for a client. дальше »
2019-8-15 19:00 | |
Monero (XMR): Access Mining is the new Malware Mining
It is an open secret that the supply of the crypto currency Monero partly feeds from illegal sources. With no other crypto currency is the phenomenon of malware mining as contagious as with the privacy coin. дальше »
2019-8-16 17:54 | |
This spooky Monero-mining malware waits to be controlled remotely
Cybersecurity researchers have discovered a mysterious new strain of cryptocurrency mining (cryptomining) malware that employs powerful techniques to avoid detection and analysis. Software firm Varonis determined the malware is based on Monero mining software XMRig, which is open source and hosted on GitHub. дальше »
2019-8-15 23:42 | |
Researchers discover malware that records users’ screens when they watch porn
Researchers from antivirus developer ESET recently discovered a new form of spam-delivered malware that threatens to steal unsuspecting users’ passwords and financial information, and record their screens if they watch pornography. дальше »
2019-8-15 23:19 | |
PSA: Update your Windows machine now to fix 29 Critical security vulnerabilities
Microsoft has patched four serious vulnerabilities that could allow a malicious actor to remotely take control of Windows computers. The four remote code execution flaws — addressed as part of the company’s monthly Patch Tuesday updates — affect all in-support versions of Windows and concern the Windows Remote Desktop Services (RDS) component, enabling attackers to take over a computer and then propagate malware to other computers without any user intervention. дальше »
2019-8-14 14:35 | |
Chinese cyber-espionage group is extorting money from the gaming industry
A Chinese threat actor, known to have perpetrated a series of state-sponsored espionage attacks, has been covertly staging financially motivated activities targeting the video game industry. According to cybersecurity firm FireEye, the cyber threat group — dubbed Advanced Persistent Threat 41 (APT41) — is unique in that “it leverages non-public malware typically reserved for espionage campaigns in what appears to be activity for personal gain. дальше »
2019-8-12 14:00 | |
XMR Cryptojacking Malware Smominru Updated, Now Targeting User Data
Malware Smominru mines Monero on at least half a million infected computers and now also steals sensitive personal data
дальше »2019-8-10 20:40 | |
Zscaler ThreatLabZ Discovers New Saefko Remote-Access Trojan (RAT) Malware Targeting Crypto Users
Cybersecurity experts at the Zscaler ThreatLabZ have recently identified a new malware. This remote-access trojan is known as Saefko and it uses the browser of the victim in order to look for crypto-related history. дальше »
2019-8-10 02:00 | |
Coinbase Blocks Long-Con Hacking Attempt
After a handful of Coinbase employees received an email from Gregory Harris, the research grants administrator at the University of Cambridge, on May 30, many of them engaged in conversation with "Harris" for a few weeks. дальше »
2019-8-10 19:07 | |
Researchers uncover a new piece of RAT malware that targets cryptocurrency users
Researchers at Zscaler ThreatLabZ have identified a new remote-access trojan (RAT) called Saefko, which retrieves Chrome browser history in a search for cryptocurrency-related activity The RAT, written in . дальше »
2019-8-9 18:04 | |
Evil Bitcoin Ransomware Won't Return Your Data - Even After You Pay
An insidious new strain of Bitcoin ransomware adds insult to injury for its unfortunate victims, as it refuses to restore access to your data - even after you fork over the ransom payment. The malware, GermanWiper, tells victims it has encrypted their data, when in reality it has erased it completely. дальше »
2019-8-8 19:41 | |
Evil Bitcoin Ransomware Won’t Return Your Data – Even After You Pay
An insidious new strain of Bitcoin ransomware adds insult to injury for its unfortunate victims, as it refuses to restore access to your data – even after you fork over the ransom payment. The malware, GermanWiper, tells victims it has encrypted their data, when in reality it has erased it completely. дальше »
2019-8-9 19:41 | |
New Avast Report Details How Clipsa Crypto Stealing Malware Was Blocked Over 360k Times In Past Year
Cybersecurity company Avast says that a crypto stealing malware has so far been blocked over 360,000 times by its security software, the Nextweb reports. Referred as Clipsa, the malware is said to be a multipurpose password stealer and can steal or launch crypto-mining albeit illicitly. дальше »
2019-8-7 00:09 | |
This cryptocurrency stealing malware was blocked more than 360,000 times over the past year
As long as cryptocurrency has value, people will try to steal it. According to the latest figures from cybersecurity firm Avast, a cryptocurrency stealing malware has been blocked more than 360,000 times by its software. дальше »
2019-8-6 14:47 | |
Google Play hosted 205 harmful apps with over 32M installs last month alone
It seems Google is losing the battle against sketchy Android software big time. The company hosted over 205 harmful apps on the Play store in July only. The kicker: these apps were downloaded over 32 million times in total in the past month alone. дальше »
2019-8-1 17:26 | |
New Android ‘sex simulator’ ransomware spreads via SMS messages
If you’re using an Android phone, there’s a new family of ransomware attack that leverages SMS to spread, according to new research from Slovakia-based cybersecurity firm ESET. The ransomware — referred to as Android/Filecoder. дальше »
2019-7-31 14:19 | |
Cloud Computing Attacks On The Rise As Desktop Mining Malware Falls In Popularity
A study from Skybox Security suggests that malicious crypto miners are now focused on attacking faults in cloud computing containers as the popularity of desktop crypto mining malware steadily falls off. дальше »
2019-7-24 19:11 | |
Android vulnerability lets hackers hijack your phone with malicious videos
If you use a phone running any version of Android between 7. 0 and 9. 0 (Nougat, Oreo, or Pie), you ought to immediately install the latest security update – or risk getting your handset hijacked by devious video malware. дальше »
2019-7-24 17:07 | |
Unsuspecting victims were cryptojacked 52.7 million times in the first half of 2019
Criminals made a staggering 52. 7 million cryptojacking hits during the first six months of the year. According to the latest research from SonicWall, cryptojacking activity rose by 9 percent between January and June 2019 when compared to levels seen in the last six months of 2018. дальше »
2019-7-24 13:01 | |
Vicious malware threatens to turn search engine into crypto-mining zombie botnet
Enterprise search engine Elasticsearch is under threat of being turned into a sophisticated cryptocurrency mining botnet to be used in distributed denial of service (DDoS) attacks. Cybersecurity firm Trend Micro describes a new malware strain that launches multi-stage attacks on publicly accessible databases and servers that run old versions of Elasticsearch software. дальше »
2019-7-23 17:54 | |
It’s 2019 and Google still can’t keep malware out of its Android app store
Google appears to have a problem with stopping malicious apps from sneaking into the Play Store. In what appears to yet another case of malware disguised as a legitimate app, security researchers from Symantec have found a new app that advertised itself as an unofficial version of Telegram messaging app — only to push malicious websites in the background. дальше »
2019-7-16 14:40 | |
Radware’s Cloud Workload Protection Service now includes ‘crypto-jacking’ detection
CryptoNinjas - Bitcoin, Cryptocurrency & Blockchain Asset SourceRadware, a leading provider of cybersecurity and application delivery solutions, today announced that its Cloud Workload Protection Service now identifies and mitigates coin-mining malware known as ‘crypto-jacking’ operations taking place in customers’ public cloud environments. дальше »
2019-7-16 14:31 | |