One in 25 Searchable ‘Black Friday’ Apps Blacklisted as Malicious, Finds Report

Black Friday is a big day for shoppers. In 2016, 154 million consumers shopped over Thanksgiving weekend and spent $9.36 billion, constituting a year-over-year increase of 16.4 percent. More than half of that money spent ($5.27 billion) occurred online. Building on those figures, Black Friday 2017 looks like it will be even bigger than in … Read More The post One in 25 Searchable ‘Black Friday’ Apps Blacklisted as Malicious, Finds Report appeared first on The State of Security.
Read more

Proton is back, again

The backdoor malware OSX/Proton has resurfaced. This time it’s distributed by a fake blog, reporting on a fake malware story, linking to a fake malware scanner which contains the Proton installer. For the full story, have a look here. The post Proton is back, again appeared first on SecuritySpread.
Read more

Black Friday Deals: Trojans, Phishing, and Bitcoin Mining

Thanksgiving is once again upon us, followed by "Black Friday," which typically means one of two things: you will either be spending time with family as you recover from a food hangover, or you will be fighting the crowds for deals at retail stores. But wait! There is a way you can have your pumpkin pie and eat it too. These days most shopping outlets promote their Black Friday/Cyber Monday deals on their websites in advance of the holiday; many offer great online deals and perks like free shipping to entice shoppers to avoid the crowds and shop online. But beware: malware authors anticipate the increase in online shopping and use the season to manipulate users to their own ends. As shopping increases, so do risks Today’s bad actors use a variety of methods to lure users into clicking malicious links or opening infected files. They use phishing to attempts to harvest credentialsor lead victims to less-than-reputable stores. They send opaquely named files and create websites designed to confuse recipients. They can even use your CPU resources when you visit their shop to mine Bitcoins without consent. In this blog, we will describe in further detail how some of these techniques are being used, and how to avoid them. When does it...
Read more

IcedID – New Banking Trojan targets US-based companies with web injects

The malware research team in the UAB Computer Forensics Research Lab is widening its horizon and is always on the look out for new malware families. While researching new malware families, Arsh Arora, Ph.D. Candidate at UAB, found some chatter about the new banking trojan IcedId.  Although ransomware is the most discussed malware in the press for many financial institutions the most feared malware type is the Banking Trojan. The objective of most banking trojans is to steal banking credentials and eventually steal the money from account holders.IcedID Banking Trojan IBM X-Force discovered a new banking trojan IcedID that was first detected in September 2017. It is known as modified version of the Zeus Trojan. The following trojan spreads by Emotet worm which is able to spread from machine to machine inside a network via weak administrator passwords.One of our malware research team members, Shawn Sharp,  decided to dig into this malware. IBM had already provided a detailed explanation of the infection part, so we decided to take a different approach and focused on analyzing the web injects on a number of websites.The sample used to test was:MD5 - a6531184ea84bb5388d7c76557ff618d59f951c393a797950b2eb3e1d6307013Virus Total Detection - 49/67. The sad part is that...
Read more

Tripwire University 2017: EMEA Edition

Foundational controls help IT organisations focus on setting basic and effective security priorities. According to the Center for Internet Security (CIS), applying just their first five critical controls can reduce your risk of cyberattack by nearly 85%. So, when it comes to foundational controls, how does your organisation compare? Join Tripwire and other security experts … Read More The post Tripwire University 2017: EMEA Edition appeared first on The State of Security.
Read more
Page 1 of 2712345...1020...Last »