Remove 2006 Remove Malware Remove Passwords
article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

This post is a deep dive on “ Megatraffer ,” a veteran Russian hacker who has practically cornered the underground market for malware focused code-signing certificates since 2015. More recently, it appears Megatraffer has been working with ransomware groups to help improve the stealth of their malware. WHO IS MEGATRAFFER?

Malware 299
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. APT41 was known to hide its malware inside fake resumes that were sent to targets. APT41’s activities span from the mid-2000s to the present day. Security analysts and U.S.

Antivirus 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Open Subtitles breach: The dangers of password reuse

Malwarebytes

Data included email and IP addresses, usernames and unsalted MD5 password hashes. He gained access to all users’ data – email, username, password…He promised the data would be erased and he would help us secure the site after the payment. This one falls under the familiar banner of “password reuse is bad”.

Passwords 103
article thumbnail

No “Apple magic” as 11% of macOS detections last year came from malware

Malwarebytes

We’re going to let you in on a little cybersecurity secret… There’s malware on Mac computers. This mass adoption was good for Microsoft and its revenue, but it also drew and maintained the interests of cybercriminals, who would develop malware that could impact the highest number of victims. There pretty much always has been.

Malware 142
article thumbnail

Alleged FruitFly malware creator ruled incompetent to stand trial

Malwarebytes

The university was notified by an undisclosed third party, who provided information to help the team find and identify the malware. Together, CWRU and the FBI were able to identify that an IP address with which the malware was communicating had also been used to access the alumni email account of a man called Phillip Durachinsky.

Malware 108
article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked. David Balaban is a computer security researcher with over 17 years of experience in malware analysis and antivirus software evaluation.

article thumbnail

“FudCo” Spam Empire Tied to Pakistani Software Firm

Krebs on Security

The Web site in 2015 for the “Manipulaters Team,” a group of Pakistani hackers behind the dark web identity “Saim Raza,” who sells spam and malware tools and services. Also we are running business since 2006.” Regarding phishing, whenever we receive complaint, we remove the services immediately.

Software 294