SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22
Security Affairs
DECEMBER 1, 2024
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Security Affairs
DECEMBER 1, 2024
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.
Krebs on Security
JUNE 7, 2021
In the process of doing so, I encountered a small snag: The FSB’s website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware. Image: Wikipedia. biz, circa 2007.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
MAY 4, 2022
There are many keys to its stealth, including: The use of a unique backdoor Mandiant calls Quietexit, which runs on load balancers, wireless access point controllers, and other types of IoT devices that don’t support antivirus or endpoint detection. This makes detection through traditional means difficult.
Security Affairs
APRIL 24, 2024
A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute backdoors and cryptocurrency miners. Avast researchers discovered and analyzed a malware campaign that exploited the update mechanism of the eScan antivirus to distribute backdoors and crypto miners.
Security Affairs
JANUARY 10, 2025
In August 2024, Russian crooks advertised a macOS malware called BANSHEE Stealer that can target both x86_64 and ARM64 architectures. The malware authors claimed it can steal a broad range of data from compromised systems, including browser data, cryptocurrency wallets, and around 100 browser extensions.
The Hacker News
JANUARY 9, 2025
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer.
eSecurity Planet
OCTOBER 4, 2021
percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent of such organizations that lack processes for decrypting and scanning HTTPS traffic for threats. Malware in Encrypted Traffic.
Security Affairs
MARCH 10, 2025
Kaspersky researchers discovered a mass malware campaign spreading SilentCryptoMiner by disguising it as a tool to bypass internet restrictions. While investigating the increased use of Windows Packet Divert ( WPD ) tools by crooks to distribute malware under this pretense, the researchers spotted the campaign.
Webroot
NOVEMBER 21, 2024
The five core components of a VPN are: Encryption : The conversion of information into a coded format that can only be read by someone who has the decryption key. Split tunneling: Allows you to choose which internet traffic goes through the VPN (with encryption) and which goes directly to the internet. How do VPNs work?
Security Affairs
NOVEMBER 24, 2024
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks.
Security Affairs
FEBRUARY 16, 2021
Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware. Latin American trojans share the same modus operandi and even modules and blocks of code observed during the analysis of several malware samples. Background of Latin American Trojans.
Krebs on Security
MAY 22, 2019
Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Here’s a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harboring malware. Please download and read the attached encrypted document carefully.
CSO Magazine
AUGUST 30, 2021
The threat uses what researchers from antivirus vendor Sophos call “intermittent encryption,” meaning it only encrypts chunks of data inside a file instead of its complete contents. Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. |
Webroot
FEBRUARY 21, 2025
What began as antivirus product has expanded into a comprehensive portfolio to secure your entire digital life. Introducing Webroot Total Protection: Comprehensive security for the modern world When you think about cybersecurity, you probably think of antivirus protectionand rightly so. But as technology advances, so do the threats.
SecureWorld News
OCTOBER 31, 2024
Vampire malware: draining systems dry This malware creeps in undetected, draining resources and stealing data in the dark. Like vampires, malware strains can operate quietly, leeching data or encrypting files without warning, making ransomware and spyware infections incredibly haunting.
Security Affairs
AUGUST 31, 2021
Recently emerged LockFile ransomware family LockFile leverages a novel technique called intermittent encryption to speed up encryption. Sophos researchers discovered that the group is now leveraging a new technique called “intermittent encryption” to speed up the encryption process.
Malwarebytes
OCTOBER 11, 2023
The Philippine Health Insurance Corporation (PhilHealth), has confirmed that it was unprotected by antivirus software when it was attacked by the Medusa ransomware group in September. Stop malicious encryption. Detect intrusions. Use EDR or MDR to detect unusual activity before an attack occurs. Don’t get attacked twice.
eSecurity Planet
OCTOBER 24, 2023
Malware attacks pose a significant risk to both individuals and businesses, infiltrating computer systems, compromising sensitive data and disrupting operations, leading to financial and data loss — and even extortion. Here are 15 important controls and best practices for preventing malware.
Security Affairs
FEBRUARY 28, 2025
In September 2024, Doctor Web researchers uncovered a malware, tracked as Vo1d , that infected nearly 1.3 In August 2024, several users reported that Dr.Web antivirus detected changes in their TV box system files. Researchers at the Chinese cybersecurity firm QiAnXin (QAX) recently discovered 89 new malware samples.
Security Affairs
JANUARY 8, 2021
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the victims’ memory. According to researchers from AT&T’s Alien Labs, malware authors are choosing the Ezuri memory loader for their malicious codes. ” concludes the report.
SecureList
MARCH 5, 2025
They started distributing malware under the guise of restriction bypass programs and injecting malicious code into existing programs. The most commonly used malware families were NJRat, XWorm, Phemedrone and DCRat. This technique is used to hinder automatic analysis by antivirus solutions and sandboxes.
Security Affairs
MAY 25, 2020
Ransomware encrypts from virtual machines to evade antivirus. Ragnar Locker deploys Windows XP virtual machines to encrypt victim’s files, the trick allows to evaded detection from security software. Mounting all the shared drives to encrypt. Custom Ragnar Locker ransom note (Source: Sophos).
SecureList
NOVEMBER 6, 2024
It also uses stealer malware to extract the victim’s credit card data as well as details about the infected device. Technical Details Background In August 2024, we stumbled upon a massive infection caused by an unknown bundle consisting of miner and stealer malware. SteelFox.gen , Trojan.Win64.SteelFox.*. SteelFox.*.
Malwarebytes
NOVEMBER 16, 2021
This Android app, purported as a secure messaging application that uses end-to-end encryption, is the latest ruse cybercriminals put upon smartphone users, particularly those based in India, to infect their devices with GravityRAT, a piece of malicious software that is known to spy on people and steal their data.
Hacker Combat
OCTOBER 25, 2021
Google has reported that it disrupted the phishing attacks where threat actors had tried to hijack various YouTube accounts using cookie theft malware. When the victims clicked on the link, it would redirect the victim to some malware landing page. . The malware has the ability to steal passwords and cookies.
Security Affairs
JUNE 11, 2021
Experts spotted a new mysterious malware that was used to collect a huge amount of data, including sensitive files, credentials, and cookies. Threat actors used custom malware to steal data from 3.2 NordLocker experts speculate the malware campaign leveraged tainted Adobe Photoshop versions, pirated games, and Windows cracking tools.
SecureWorld News
JANUARY 16, 2025
Regularly updating and patching systems, including antivirus software, firewalls, and SCADA networks, can mitigate this risk. Hackers used compromised credentials to gain access to Colonial Pipeline's network, deploying ransomware that encrypted critical systems.
eSecurity Planet
FEBRUARY 4, 2022
Malware is one of the biggest threats businesses face, and with nearly a third of all malware coming through the internet and email, businesses and consumers alike need ways to protect themselves. Antivirus Software. Also Read: 4 Best Antivirus Software of 2022. Key Features of Antivirus Software. Back to top.
Krebs on Security
MARCH 28, 2021
New data suggests someone has compromised more than 21,000 Microsoft Exchange Server email systems worldwide and infected them with malware that invokes both KrebsOnSecurity and Yours Truly by name. Oddly, none of the several dozen antivirus tools available to scan the file at Virustotal.com currently detect it as malicious.
Krebs on Security
APRIL 22, 2019
The owner of a Swedish company behind a popular remote administration tool (RAT) implicated in thousands of malware attacks shares the same name as a Swedish man who pleaded guilty in 2015 to co-creating the Blackshades RAT , a similar product that was used to infect more than half a million computers with malware, KrebsOnSecurity has learned.
Webroot
FEBRUARY 21, 2025
Its a top-end, true all-in-one offering based on a new platform that combines antivirus, password manager, identity protection, VPN, backup, and parental controls. Comprehensive antivirus software is most effective when used in conjunction with security best practices. This is where data encryption and automated backups come in.
Malwarebytes
AUGUST 3, 2022
Before initialization, the malware effectively suppresses all error reporting by calling SetErrorMode with 0x8007 as parameter. As we will see later, that malware uses multiple threads and so it allocates a global object and assigns a mutex to it to make sure no two clashing operations can take place at the same time. main function.
Krebs on Security
NOVEMBER 22, 2019
17, unknown attackers launched a ransomware strain known as Ryuk inside VCPI’s networks, encrypting all data the company hosts for its clients and demanding a whopping $14 million ransom in exchange for a digital key needed to unlock access to the files. At around 1:30 a.m. They didn’t even succeed at first, but they kept trying.”
Security Affairs
APRIL 29, 2023
A new variant of the information-stealing malware ViperSoftX implements sophisticated techniques to avoid detection. Trend Micro researchers observed a new ViperSoftX malware campaign that unlike previous attacks relies on DLL sideloading for its arrival and execution technique. c2 arrowlchat[.]com c2 arrowlchat[.]com
Security Affairs
JANUARY 16, 2023
Antivirus firm Avast released a free decryptor for the BianLian ransomware family that allows victims to recover locked files. Security firm Avast has released a free decryptor for the BianLian ransomware to allow victims of the malware to recover locked files. It is also recommendable to check the virus vault of your antivirus.
The Last Watchdog
MARCH 6, 2021
A VPN encrypts all internet traffic so that it is unreadable to anyone who intercepts it. Use antivirus software. Your devices need excellent antivirus software to act as the next defense line by blocking and detecting known malware. Ransomware or other varieties of malware can wipe entire systems.
Webroot
MARCH 12, 2025
Backing up your data simply means creating copies of your important files and storing them in secure, encrypted locations. This can be caused by software bugs, hardware failures, viruses and malware , resulting in system crashes or data corruption. Ensures that your valuable data is encrypted, secure, and accessible when you need it.
Security Affairs
MARCH 7, 2025
“Like the majority of ransomware operators, Spearwing and its affiliates carry out double extortion attacks, stealing victims’ data before encrypting networks in order to increase the pressure on victims to pay a ransom,” reads the report published by Symantec.
eSecurity Planet
OCTOBER 18, 2022
However, even with the best planning, organizations can find a few users, machines, or systems that were overlooked or whose backup may be corrupted or encrypted. These steps are covered in more depth in How to Recover From a Ransomware Attack , so for now, we’ll simply presume the attackers and malware are under control.
CyberSecurity Insiders
MAY 14, 2023
One way to secure information in the cloud is through encryption. Encryption is the process of converting information into a code that only authorized parties can access. Cloud providers use encryption to protect data at rest, which means when the data is stored on the provider’s servers.
Security Affairs
APRIL 21, 2024
The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple organizations in multiple industries, including education, finance, and real estate. The Akira ransomware operators implement a double extortion model by exfiltrating victims’ data before encrypting it.
Krebs on Security
DECEMBER 13, 2021
31, 2021, the HSE’s antivirus software detected the execution of two software tools commonly used by ransomware groups — Cobalt Strike and Mimikatz — on the Patient Zero Workstation. But the antivirus software was set to monitor mode, so it did not block the malicious commands.” Now this is in itself isn’t bad.
Security Affairs
DECEMBER 19, 2022
The main reasons to rewrite malware in Rust is to have lower AV detection rates, compared to malware written in most common languages, and to target multiple architectures. ” Upon executing the malware, the Rust binary prompts an error requiring a password to be passed as an argument. SecurityAffairs – hacking, malware).
Hacker Combat
APRIL 6, 2022
You are neither safe on your private nor public network, as ransomware can encrypt your files and hold them hostage. When you open an infected file that seemingly appears safe, ransomware executes its process by encrypting data. You can defeat ransomware through specific preventive measures, including software and encryption.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content