Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

LokiBot Android banking trojan turns into ransomware if users try to remove it. The gang behind the attack has made more than $1.5 million [Read More]
The Bad Rabbit ransomware attack that hit Russia and Ukraine has been linked to NotPetya, but the number of infections is far smaller [Read More]
Several major organizations in Russia and Ukraine hit by a new ransomware dubbed Bad Rabbit. Victims asked to pay 0.05 bitcoin [Read More]
Study shows one-third of industrial networks are accessible from the Internet and 10% of OT networks are already infected with malware [Read More]
Russia-linked cyberspy group APT28 using NATO’s CyCon cybersecurity conference to trick users into installing malware [Read More]
Locky starts using new technique involving the DDE protocol to evade detection and improve infection rates [Read More]
A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Canada’s CSE spy agency releases the source code of a malware detection and analysis tool named Assemblyline [Read More]
Hackers breach Eltima website and use it to deliver macOS RAT Proton via a trojanized version of Elmedia Player [Read More]
Recently observed distribution campaigns featuring the Ursnif banking Trojan were using new malicious macro tactics for payload delivery [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...