Astaroth Trojan Resurfaces, Targets Brazil through Fileless Campaign
During routine detection monitoring from our Advanced Threat Control technology, Bitdefender researchers found an interesting spike in malware activity that involved using Microsoft binaries in the infection process, as well as GitHub and Google Drive for delivering payloads. After analyzing the detection details, we identified this activity as a resurgence ... Read More
An APT Blueprint: Gaining New Visibility into Financial Threats
This new Bitdefender forensic investigation reveals a complete attack timeline and behavior of a notorious financial cybercriminal group, known as Carbanak. In mid-2018, Bitdefender researchers investigated a targeted attack on an Eastern European financial institution, gaining new insights and creating a complete event timeline showing how the infamous group Carbanak ... Read More
What Happens on the Endpoint Stays on the Endpoint
When attacks bypass endpoint security, it can often take months for enterprises to discover them. Some security reports even estimate that it requires U.S. companies an average of 191 days to detect... Go on to the site to read the full article ... Read More
Triout Android Spyware Framework Makes a Comeback, Abusing App with 50 Million Downloads
In August 2018, Bitdefender researchers stumbled across an Android malware framework, dubbed Triout, which packed massive surveillance capabilities. Bundled with a legitimate application ripped from the official Google Play marketplace, the spyware framework can hide its existence on the device, record phone calls, log incoming text messages, record videos, take ... Read More
PHP PEAR Site Hacked; Tainted Package Available for Months
The official PHP Extension and Application Repository (PEAR) website has been shut down after an apparent hack caused the original PHP PEAR package manager to be replaced by attackers with a tainted version. The framework developers have taken the website offline after noticing that the original PHP PEAR package manager ... Read More
GandCrab: The most popular Multi-Million Dollar Ransomware of the Year
Ransomware has been around for years and has inflicted financial losses estimated in the billions of dollars. As one of the most lucrative types of malware, from a financial perspective, ransomware developers have invested considerable time, effort, and knowledge into perfecting both its delivery mechanisms and its capabilities. Traditional ransomware ... Read More
Bitdefender Finds Hackers Targeting High-Profile US Election Candidates Using Fake Domains with Fake Scandals
Here at Bitdefender Labs we are closely watching the US Midterm Elections in search of anomalies in malware, spam, misinformation and social network activity. What is a ‘fake domain’? Typically, a fake website. Hackers register variations of valid website domains in order to hijack them and create lookalike websites with ... Read More
Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
Pleading guilty for two felony counts of computer fraud, Billy Ribeiro Anderson, also known as ’Anderson Albuquerque‘ and ’AlfabetoVirtual,’ now faces up to 10 years in prison, according to US prosecutors. Defacing more than 11,000 US websites, 41-year-old Anderson was accused of hacking into military, government and various business websites, ... Read More
Scammers Target Google Chrome Extension Developers
A recent phishing campaign targeting Chrome extension developers aims to trick them into giving away usernames and passwords that hackers can use to tamper with legitimate extensions. In an attempt to collect developers’ Google account passwords, hackers have been emailing Chrome extension developers using an alleged Google employee email address ... Read More
Best Practices for Choosing an Endpoint Detection and Response (EDR) Solution
The increase in cloud adoption has significantly impacted the way organizations think about security, in the sense that threat visibility into infrastructures has become mandatory in light of how the threat landscape has evolved. Starting from the premise that threat actors can and will breach infrastructures, organizations need to begin ... Read More
