Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Russia-linked threat group Gamaredon starts using custom malware in attacks aimed at Ukraine [Read More]
Symantec believes multiple threat groups may have worked together in the recent Shamoon 2 attacks [Read More]
Lazarus-linked hackers behind attacks on banks worldwide attempted to trick investigators into thinking they speak Russian [Read More]
Google shares data on the malware, phishing and spam emails targeting corporate Gmail inboxes [Read More]
China-linked threat actor uses new ChChes malware in attacks aimed at Japanese academics and organizations [Read More]
Many organizations in Ukraine targeted in a campaign that shares some similarities with Operation Groundbait [Read More]
Cyber espionage group with ties to Iran and Shamoon attacks targets organizations in Middle East, particularly Saudi Arabia [Read More]
IBM researchers believe Shamoon used macro-enabled documents and PowerShell scripts to infect victims [Read More]
Russia-linked threat group APT28 (aka Pawn Storm, Fancy Bear and Sofacy) created a Mac version of its X-Agent Trojan [Read More]
Thousands of Android devices, including ones running Android 6 and 7, infected with Marcher trojan [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...