Security Experts:

Virus & Malware
long dotted


A second variant of the Shamoon 2 malware targets virtualization products, likely in an effort to make recovery more difficult and increase the impact of the attack [Read More]
Exploits for a couple of Microsoft Edge vulnerabilities patched in November 2016 have been added to the Sundown exploit kit [Read More]
An Iran-linked threat group has been distributing malware via a fake VPN portal and fake University of Oxford websites [Read More]
The Sundown exploit kit has started using steganography to hide its exploits in harmless-looking image files [Read More]
A new variant of the KillDisk malware encrypts files and holds them for ransom instead of deleting them [Read More]
New Android Trojan dubbed “Switcher” hacks routers and changes their DNS settings to redirect traffic to malicious websites [Read More]
Russia-linked cyberespionage group Fancy Bear (aka APT28 and Pawn Storm) tracked Ukrainian troops using Android malware [Read More]
Kaspersky has identified 1,000 computers infected with Zcash miners, potentially generating thousands of dollars per month for cybercriminals [Read More]
PowerShell, the scripting language and shell framework that is installed by default on most Windows computers, is becoming a favored attack tool for malware infections. [Read More]
PluginPhantom is a new Android Trojan that abuses the DroidPlugin plugin framework to evade static detection. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...