A malware researcher and a twitter user Fumik0_ has discovered a new website that is spreading crypto malware. This fake cryptocurrency trading website is masquerading as a legitimate service that delivers crypto-stealing malware trojan known as Vidar. This malware trojan is distributed through a site that impersonates CryptoHopper trading platform which allows users to build...Continue Reading
Summary New phishing campaign is in circulation requiring users to login to a fraudulent OneDrive site in order to unveil an encrypted message. Analysis A believed to be phishing emails with subject similar to ‘Encrypted Message Received’ and includes a link stating ‘View Encrypted Email’. Message link will divert the user to a fake OneDrive...Continue Reading
Cyber-security researchers are warning owners of Joomla and WordPress websites of a malicious redirect script that is pushing visitors to malicious websites and expose them to various malwares. A renowned cyber-security researcher published a report outlining a rogue hypertext access (.htaccess) injector found on a client website. He reported that the impacted site was...Continue Reading
BlackRouter, a ransomware recognized in 2018 is currently being endorsed as a Raas by its maker. The individual behind BlackRouter, known as “MOH3NE2”, is accepted to be of Iranian origins. This ransomware was identified by a cybersecurity scientist Petrovic and is found to have enhanced highlights, for example, a clock and an alternate GUI...Continue Reading
Deceptive phishing has been proliferating recently with campaigns appearing to come from the “Office 365 Team”. Phishing emails are warning recipients that there has been an unusual amount of file deletions occurring on their account. The phishing campaign pretends to be a warning from the Office 365 service that states a medium-severity alert has been...Continue Reading
Summary Triada Trojan has been found in the firmware of various low-cost Android devices, which could be used to steal sensitive data and run cyber espionage modules. Analysis First seen in March 2016 and labelled as the most advance mobile Trojan during that time specifically engineered as Android banking trojan. Android system images were...Continue Reading
Summary New found malware dubbed as HiddenWasp believed to be targeting linux ecosystem, developers of this malware deployed it to remotely control infected Linux systems. The malware is also established from key parts of code used in Mirai and Azazel rootkit. Surprisingly, HiddenWasp has a zero-detection rate in all anti malware program under Linux. Analysis This malware main goal is to take control of compromised...Continue Reading
Summary Researcher recently uncover bug in the macOS security feature Gatekeeper that allows malicious code execution on systems running the most recent version of Mojave (10.14.0) release. Included in macOS since 2012, the Gatekeeper security protection attempts to prevent malware from running on a Mac by enforcing code signing and verifying downloaded applications before execution. Analysis The...Continue Reading
On December 29, 2019, the National Cybersecurity Authority of Saudi Arabia published a new cyber-attack incident describing software that was deployed to target Bapco, the national oil company of Bahrain specifically. The malware, dubbed as “Dustman”, is a data-wiper, designed to access a computer, a database, or a server/mainframe, delete its data, and replace the...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.