Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Tortoiseshell threat group has been targeting job seekers in the United States, especially military veterans. [Read More]
xHunt campaign targets transportation and shipping organizations based in Kuwait using new malware. [Read More]
An investigation into banking malware targeting India has led to the discovery of a new RAT employed by the North Korean-linked Lazarus group. [Read More]
Researchers have observed a new series of phishing attacks targeting United States utilities in an attempt to deliver the LookBack RAT. [Read More]
A Mac Trojan focused on stealing users’ information was found masquerading as a legitimate trading application. [Read More]
A recently observed phishing campaign is targeting taxpayers in the United States in an attempt to infect their machines with Amadey malware. [Read More]
The Smominru botnet continues to spread at a fast pace, infecting around 4,700 new hosts daily during the month of August. [Read More]
Following a 4-month vacation, Emotet’s operators are back at it, borrowing a recently introduced spear-phishing technique to deliver their malware. [Read More]
A new threat actor tracked as Panda has generated thousands of dollars in Monero using RATs and cryptocurrency mining malware. [Read More]
Recently discovered cryptocurrency mining malware targeting Linux machines is employing kernel-mode rootkits in an attempt to make detection more difficult. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...