Security Experts:

Virus & Malware
long dotted


Electrum, the Russia-linked hacker group responsible for the 2016 power outage in Ukraine, no longer focuses exclusively on Ukraine [Read More]
Researchers find new stage 3 modules of VPNFilter malware and determine that devices from ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE are also targeted [Read More]
Despite their infrastructure being disrupted, the hackers behind the VPNFilter botnet continue to target routers in Ukraine [Read More]
Alert issued by the DHS and FBI attributes the Joanap backdoor trojan and the Brambul worm to the North Korean government [Read More]
FBI’s analysis of massive VPNFilter attack raises some questions on Russia-linked hacker groups. Agency advises users to reboot routers [Read More]
Russian police arrest Russian national involved in a scheme that helped cybercriminals make up to $8,000 per day using Android banking Trojans [Read More]
Mac users targeted with a piece of malware designed to mine Monero cryptocurrency via the legitimate XMRig tool [Read More]
Xenotime, the threat group behind the Triton/Trisis attack, is still active and it has targeted entities far outside the Middle East and safety systems other than Triconex [Read More]
Russia may be preparing a new cyberattack on Ukraine using a botnet of at least 500,000 routers and NAS devices. The malware has destructive capabilities and can target SCADA systems [Read More]
Drupal websites hacked via the Drupalgeddon2 and Drupalgeddon3 vulnerabilities deliver cryptocurrency miners, RATs and tech support scams [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...