Yet Another Meltdown – A Microarchitectural Fill Buffer Data Sampling Vulnerability (CVE-2018-12130)

Yet Another Meltdown – A Microarchitectural Fill Buffer Data Sampling Vulnerability (CVE-2018-12130)

More than one year ago, security researchers at Google Project Zero have disclosed a series of hardware vulnerabilities affecting Intel® x86 microprocessors. Leveraging a feature of modern processors called speculative execution, as well as timing responses, this family of flaws in hardware defeats the architectural safeguards of the processor and ... Read More
Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation

Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation

Last year, the Bitdefender Cyber Threat Intelligence Lab started analysis of a new password- and data-stealing operation based around a rootkit driver digitally signed with a possibly stolen certificate. The operation, partially described in a recent article by Tencent, primarily targeted Chinese territory until recently, when it broke out around ... Read More

Thwarting GandCrab in the New Era of Agile Computer-Jackers

|
New Bitdefender decryptor can be deployed across the network to automate recovery ... Read More
New GandCrab v5.1 Decryptor Available Now

New GandCrab v5.1 Decryptor Available Now

Today we’re happy to announce that our collaboration with the Romanian Police, Europol and other law enforcement agencies has yielded another new decryptor for all GandCrab ransomware versions released since October 2018. If you need to decrypt versions 1, 4 and up through 5.1, then download and run our brand ... Read More
Bitdefender identifies major fake news website farm ramping up social traffic

Bitdefender identifies major fake news website farm ramping up social traffic

It is elections season in the US and digital guerilla groups are making their presence felt in hopes of swinging the vote one way or another. With less than two weeks left to manipulate voters’ opinions, cyber-propagandists are deploying an arsenal of websites to spread disinformation. Bitdefender researchers have identified ... Read More
Politics-themed spam spikes weeks ahead of elections

Politics-themed spam spikes weeks ahead of elections

| | Election Security
Here at Bitdefender we are keeping an eye on the upcoming Midterm Elections in the USA and are monitoring threat intelligence feeds in search of anomalies in malware, spam or social network activity. This year’s mid-term elections are less than three weeks away, but hackers have already started capitalizing on ... Read More
Bitdefender GandCrab decryptor for Syrian users now available

Bitdefender GandCrab decryptor for Syrian users now available

We’re happy to announce the release of a new decryptor for victims of GandCrab ransomware. The tool can only be used by a limited pool of victims located in Syria, and works for GandCrab ransomware versions 1 through 5. At the tool’s core is the roughly 1000 decryption keys deliberately ... Read More
Facebook leaks data (including private conversations) from 50 million accounts

Facebook leaks data (including private conversations) from 50 million accounts

40 million more “likely” affected If you were born in the late 80s, you probably know the meaning of AFK. Otherwise, not only that you likely have no clue what it is, but chances are that you never logged out of your account. And that was perfectly fine. Until today, ... Read More
LockCrypt Ransomware decryption tool

LockCrypt Ransomware decryption tool

LockCrypt has been around since mid-2017 with a particular focus on business customers. Spreading by bruteforcing Remote Desktop Protocol credentials, this ransomware family has several sub-variants with the following specific extensions: .1btc (decryptable and included in this version of the tool) .lock (decryptable, not included in our tool) .2018 (decryptable, ... Read More

More Organizations Are Adopting Biometrics for Security—But Barriers Still Remain

|
For years, biometrics technology has been discussed as a possible solution for more effectively controlling access to systems and networks. But the technology has often been deemed to be too expensive for many organizations and too invasive for end users—and as a result adoption has been slower than some might ... Read More