Malware

ColoredLambert malware uses new ways to infect your PC DePriMon downloader

It is assumed that the downloader uses methods not seen in the wild before. A malware downloader was found using new “Port Monitor” methods not detected in active campaigns before. The malicious downloader Dubbed DePriMon is used for the delivery of Lambert malware-the community APT, which is specialized in attacks against European and Middle East

[ Read More ]

Current Gustuff Mobile Banking Version Trojan Emerges

Gustuff’s recent Android banking campaigns have included an updated malware version, reports Cisco Talos security researchers. Earlier this year, shortly after the software was described, its operators switched delivery hosts, then moved to remove the C&C network, but continued to control the software via a SMS-based secondary management system. The Gustuff now has a smaller

[ Read More ]

Giant Ingredion Ingredients Attack Malware

Westchester, Ingredion Incorporated, an Illinois-based ingredient corporation, announced this week that criminal activity has recently been found on certain data center servers. Just a few specifics about the incident have been given, but a piece of malware seems to have compromised some systems of the business. Ingredion says there is no evidence of any compromise

[ Read More ]

Online Freelance site Fiverr offers Illegal Private Spying Services

After Motherboard approached the company to comment, Fiverr removed a number of listings. A free-lance Fiverr site allows a company to hire a short-term application developer, logo designer or help with their social media accounts. Fiverr is also a place where you can purchase malware to illegally spy on your wife, pay someone to place

[ Read More ]

All about Malware Trade and it’s Psychological Tricks

As a professional services consultant, I am pleased to meet customers around the world and talk to a wide range of IT security experts who are at the forefront of malware defence. One of my favorite topics is how people have started their IT careers, but I am frequently surprised by the number of people

[ Read More ]

More Fierce Ransomware Still On Horizon, Corporate Victims To Increase

IBM’s X-Force Incident Response and Intelligence Services (also known as IRIS) has issued a report, detailing the growth of destructive malware that infected the corporate space. The cybersecurity arm of Big Blue has disclosed that 12,316 corporate Internet-connected devices were rendered offline, costing $239 million to replace and reconfigure in an average malware attack for

[ Read More ]

Basic Guide To Prevent Virus Infection

Here, we often interchange the word “virus” with the word “malware”. It is for the purpose of simplicity, as we focus our article to the actual story rather than falling for defining the types of nasty software that was involved in the news. In this article, we provide you a quick glimpse of all malware

[ Read More ]

ViceLeaker, An Android Large-Scale Espionage Malware

It took 3-years of cat and mouse play, Kaspersky was successful with its background checks against the nature of an Android malware named ViceLeaker. Unlike a general malware type that infects random vulnerable Android device, ViceLeaker is apparently designed to infect users from Middle East countries, for the purpose of large-scale espionage operations. The malware

[ Read More ]

A Closer Look at TA505’s FlawedAmmyy RAT

Last November 24, 2018, while they were busy with their tRAT malware. The team once again surfaces with a new campaign, this time with a new remote access trojan known to Microsoft as FlawedAmmyy RAT. The technology used by the RAT is the all-time vulnerable language called the Visual Basic for Applications, also known as

[ Read More ]