Remove 2021 Remove Adware Remove Encryption
article thumbnail

IT threat evolution Q2 2021

SecureList

Communication with the server can take place either over raw TCP sockets encrypted with RC4, or via HTTPS. While analyzing the CVE-2021-1732 exploit, first discovered by DBAPPSecurity Threat Intelligence Center and used by the BITTER APT group, we found another zero-day exploit that we believe is linked to the same threat actor.

article thumbnail

The Most Common Types of Malware in 2021

CyberSecurity Insiders

Malware can be categorized based on how it behaves (adware, spyware and ransomware), and how it propagates from one victim to another (viruses, worms and trojans). If you’re lucky, the only malware program you’ve come in contact with is adware, which attempts to expose the compromised end-user to unwanted, potentially malicious advertising.

Malware 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q1 2021

SecureList

On March 2, Microsoft released out-of-band patches for four zero-day vulnerabilities in Exchange Server that are being actively exploited in the wild (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065). Ransomware encrypting virtual hard disks. The vulnerabilities are being exploited by RansomExx.

Malware 113
article thumbnail

Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report

Malwarebytes

Today, we are showing readers just what that evolution looked like, in our State of Malware 2021 report. To get the full story, read the State of Malware 2021 report. Read the State of Malware 2021 report appeared first on Malwarebytes Labs. In short, in 2020, cyberthreats evolved.

Malware 124
article thumbnail

Good old malware for the new Apple Silicon platform

SecureList

Encrypting user files. According to VirusTotal, this sample was first uploaded on 2021-02-24 21:06:05 and the original research report did not contain this hash or a module named “metald”, the name of the executable file. Adware threats for the new platform.

Malware 144
article thumbnail

macOS: Bashed Apples of Shlayer and Bundlore

Security Affairs

Though these scripts have slight variations, they mostly belong to a plague of adware strains— Shlayer and Bundlore. The malicious shell scripts used by Shlayer and Bundlore are usually malvertising-focused adware bundlers using shell scripts in the kill chain to download and install an adware payload.

Adware 135
article thumbnail

Cybersecurity ‘Vaccines’ Emerge as Ransomware, Vulnerability Defense

eSecurity Planet

Germany-based G Data CyberDefense released software designed to trick the STOP ransomware variant into believing that a targeted system has already been compromised and keeping it from encrypting files after the device has been infected. But STOP ransomware will not encrypt files anymore if the system has the vaccine.”.