Security Experts:

long dotted


The operators of an online shop specialized in selling account data and SOCKS proxies might be using CoreBot’s data theft capabilities.
A new ATM malware, dubbed “Suceful,” allows fraudsters to physically steal payment cards. The threat can also be used to steal card data and disable ATM sensors.
A new Android screening-locking malware targeting mainly users in the United States has been discovered by ESET researchers, who say this is the first ransomware to change a smartphone’s PIN security code.
CoreBot stealer has now turned into a full-fledged banking malware. New features include webinjects, form-grabbing, MitM plugin, and VNC module.
Researchers discover new version of the notorious Carbanak banking Trojan. The new variant has been used to target large corporations in the U.S. and Europe.
New Trojan named “Shifu” targets the customers of 14 Japanese banks. Users in other countries targeted as well.
KeyRaider iOS malware used to steal credentials for 225,000 Apple accounts. Stolen data used for malicious jailbreak tweaks.
IBM has warned organizations about a new piece of malware, dubbed CoreBot, designed to steal sensitive data from infected devices.
Cybercriminals using thousands of hacked WordPress sites to deliver CryptoWall 3.0 via Neutrino exploit kit. One major Angler EK customer switched to Neutrino.
The Internet Explorer zero-day patched this week by Microsoft has been used in watering hole attacks to deliver the PlugX RAT.


rss icon

Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.