TrickBot Malware Targets Active Directory

January 30th, 2020

A new TrickBot malware has some new tricks up its sleeves. Recently, TrickBot malware has compromised 250 million email accounts. Additionally, TrickBot has new capabilities that allow it to target the Active Directory database stored on compromised Windows domain controllers.

New Trojan Malware Steals Passwords From Chrome

December 16th, 2019

If you use Google's Chrome web browser, there's a new threat you should be aware of.  A new trojan targeting Windows-based machines will attempt to steal passwords stored in the Chrome browser.

Dubbed CStealer, it was discovered by the Malware Hunter Team.

New Strain of Malware Can Spy On You In Scary Ways

December 14th, 2019

There's a new strain of malware in the wild. It is targeting Android devices and disguised as an innocuous chat app.

Researchers at Trend Micro have discovered it in two different apps so far:  Chatrious and the Apex App.  Chatrious has since vanished from Google's Play Store, but at the time this piece was written, the Apex App is still available for download.

New Cryptomining Malware Targets Windows Computers

December 6th, 2019

Since October 2018, Microsoft engineers have been tracking a new strain of cryptomining malware specifically designed to target Windows machines.

As malware goes, this one isn't particularly dangerous.

It's not designed to mass delete files, lock your system down or flood you with pop-up ads.

Hackers Created a Malicious Campaign To Spread Malware

November 22nd, 2019

Researchers at Proofpoint have found evidence of a malicious campaign threat actor who has been sending out convincing looking emails.

They are claiming to come from several government agencies.

These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service.

Fake Voicemail Messages Tricking People Into Opening Malicious Content

November 19th, 2019

Office 365 has been the target of an increasing number of ongoing phishing scams using fake voicemail to lure people.

The latest scam involves using fake voicemail messages to convince targets that they need to log in to hear the full recording.

Researchers at McAfee Labs had this to say about the matter:

"McAfee Labs has observed a new phishing campaign using a fake voicemail message to lure victims into entering their Office 365 email credentials.

iOS Apps May Have Clicker Trojan Malware

November 9th, 2019

Apple's App Store by Wandera Threat Lab discovered more than a dozen iOS apps infected with the 'Clicker' Trojan malware. As malware goes, this variant isn't especially dangerous to those who wind up infected with it, but it's still problematic.

A spokesman for Wandera had this to say about the recent discovery:

"Clicker trojans generate revenue for the attacker on a pay-per-click basis by inflating website traffic.

Skip-2.0 Malware Allows Backdoor Access for Hackers

November 4th, 2019

Have you heard of Skip-2.0 malware? Prepare to be dismayed.
Backdoor Access for Hackers
Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system.

Malvertising attacks targeting iOS devices

October 8th, 2019

Malvertising Attacks: what you should know
Hackers and scammers have a new tool in their toolbox, and they're making rapid use of it.  Recently, researchers from Confiant have discovered a new malvertising attack involving a Chrome for iOS exploit. They discovered an unknown group of attackers getting around the browser's built-in pop-up blocker to deliver fake ads.

New Ransomware Called TFlower Hacks Into Company Networks

September 24th, 2019

TFlower Ransomware
Over the last two years, ransomware attacks have become increasingly common against businesses of all shapes and sizes. And, while the attack vector saw a dip in popularity last year, this year it has come roaring back to the fore with several new strains of ransomware being developed and enjoying widespread use by hackers around the world.