malware

A Closer Look at TA505’s FlawedAmmyy RAT

Last November 24, 2018, while they were busy with their tRAT malware. The team once again surfaces with a new campaign, this time with a new remote access trojan known to Microsoft as FlawedAmmyy RAT. The technology used by the RAT is the all-time vulnerable language called the Visual Basic for Applications, also known as

[ Read More ]

Etymology of Adware & How To Fight It

People’s mindshare about the existence of Adware for at least a decade has taken a backseat to more serious malware types like banking trojans, ransomware and cryptocurrency mining malware. However, Adware has a huge effect on how Windows operates, given that programs that illegally display adverts are earning money at the expense of consuming system

[ Read More ]

26-Exploits Loaded To Echobot Botnet, A Big Threat

The computing public is being made aware of an emerging botnet that is currently growing in the wild named Echobot. Considered by Palo Alto Network as the spiritual successor of Mirai botnet, Echobot now comes with an arsenal of 26 exploits designed to take over Internet-connected devices, now including a module to infect IoT and

[ Read More ]

4 Simple Tips to Fight PC Infections | Stay Protected from Threats

In today’s cybersecurity atmosphere, there is no way for any organization to assume that “we are not hacked”. The attack surface is very wide in Windows, Office, Java, Flash Player, and even the Intel processors have hardware security bugs. Basically, 2018 was a horrible year for cybersecurity because it proved how indefensible is the architecture

[ Read More ]

Why Are Web Hosting Servers Often Planted With Malware?

Ten nasty malware are currently having a field day infecting and using 10 corporate-level web hosting servers for further malware deployment to site visitors. The campaign which saw the progressive growth of Azorult, Gandcrab, Neutrino, Hermes, IcedID, Trickbot, Nymaim, Gootkit and Dridex in these 10 servers were linked to the Necurs botnet. It is a

[ Read More ]

Xwo Malware, A Powerful Cyber Espionage Tool

Xwo, a newly revealed web service vulnerability scanning malware discovered by Alien Labs, a subsidiary of AT&T, was named after the very dropper which serves as it propagating module with a file named xwo.exe. Unlike a typical ransomware that immediately issues an encryption process against the user files, Xwo was more of a monitoring-type kind

[ Read More ]

5 Likely Cybersecurity Trends For The Rest Of 2019

What are we expecting from the world of cybersecurity, as we enter its second quarter of 2019? In order to predict whatever theoretical or reasonable trajectory that we will experience for the rest of the year, let us review happened in 2018 and discuss the trend of 2018 as a guide for this year based

[ Read More ]

About Monero Malware Troajn Win32.Fysna and its infection

Since cryptojacking malware came into the scene, its favorite cryptocurrency to mine at the expense of its victims is Monero. This is due to the simplicity of mining XMR compared to Bitcoin (BTC), where stolen GPU and CPU cycles can be used for resolving hashes. Recently, Check Point has once again discovered the growing number

[ Read More ]

Malware In ThePirateBay? A Surprise Or Nothing New?

ThePirateBay has been existing for at least two decades now, migrating from one domain extension to the next during its history since September 2003. Marketed itself as an online index of all media, regardless of their copyright protection, the site grew to 35 languages through the years. It is considered the biggest content hosting site,

[ Read More ]

Restaurants & Food Businesses, New Hacking Targets?

Restaurants, food, and beverage companies are not usual targets of cyber attacks, malware infection, ransomware infestation, and data breach attempts. However, a paradigm shift is currently happening, when threat actors are looking for new victims, new industries to focus on when it comes to their campaigns. The key ingredient of becoming an attractive potential victim

[ Read More ]