Year: 2018

Two More Campaigns Spreading Monero Cryptocurrency Miners

Delaware, USA ā€“ January 26, 2018 ā€“ The growing popularity of the Monero cryptocurrency for operations in Darknet leads to new campaigns distributing various cryptocurrency miners. Adversaries attack both corporate web servers and ordinary users. Browsers started to introduce protection from Javascript miners so last weeks there has been an increase in the number of […]

Read More
New IoT Botnets Gain Strength

Delaware, USA ā€“ January 25, 2018 ā€“ A few days ago, a new IoT botnet was discovered; researchers from Bitdefender dubbed it HNS. Botnet continues to proliferate around the world: in the last 24 hours the number of bots in it has almost doubled, and at the moment there are more than 24,000 devices. Initially, […]

Read More
Monero Ransomware: New Trend or Test for Delivery Mechanism?

Delaware, USA ā€“ January 24, 2018 ā€“ The popularity of bitcoin among cybercriminals continues to fall, and forensic firm Chainalysis says that the use of bitcoin in the DarkNet fell from 30% to 1%. More and more adversaries switch to other crypto-currencies to make it more challenging to track them. Researchers from Fortinet discovered an […]

Read More
Malvertising Campaign EvilTraffic Leverages Thousands Compromised Websites

Delaware, USA ā€“ January 23, 2018 ā€“ Experts from CSE Cybsec discovered a huge malvertising campaign – EvilTraffic. Adversaries attack WordPress websites exploiting CMS vulnerabilities, and then upload to compromised websites a zip archive with malware, which after unpacking redirects visitors via hitcpm.com to malicious sites generating advertising traffic. The advertising websites contain links to […]

Read More
Vulnerabilities in Gemalto’s SafeNet Sentinel

Delaware, USA ā€“ January 23, 2018 ā€“ 14 serious vulnerabilities were discovered in Gemalto’s SafeNet Sentinel solution, some of which could lead to remote code execution or denial of service. Gemalto has already released patches that fix detected vulnerabilities but did not notify users of the severity of existing threats, so not all solutions have […]

Read More
SamSam ransomware campaign

Delaware, USA ā€“ January 22, 2018 ā€“ Over the past month, a hacker group that spreads SamSam Ransomware has conducted a number of successful attacks against organizations in the US, Canada and India. Since December 25, adversaries have managed to get more than 25 bitcoins ransom. Significant media attention was attracted to the story of […]

Read More
Dridex Banking Trojan is Distributed via Compromised FTP Sites

Delaware, USA ā€“ January 22, 2018 ā€“ Last week, researchers from Forcepoint Security Labs registered a spam campaign distributing the latest version of Dridex banking trojan. For approximately seven hours there were sent about 10,000 emails containing links to compromised FTP servers. Adversaries used two document types in this campaign: DOC files abused the DDE […]

Read More
Dark Caracal: Global Cyber Espionage Campaign Operators

Delaware, USA ā€“ January 19, 2018 ā€“ It became known about yet another global cyber espionage campaigns, which were conducted for at least five years and affected thousands of victims in more than 20 countries. Researchers from Lookout and the Electronic Frontier Foundation published the detailed report on the operations of a cybercriminal group dubbed […]

Read More
Hackers Spread Zyklon Malware via Phishing Emails

Delaware, USA ā€“ January 18, 2018 ā€“ Researchers from FireEye discovered spear phishing campaign that distributes Zyklon backdoor. The campaign targets telecommunications industry, as well as financial and insurance companies. Emails contain a zip archive with malicious MS Word document that exploits one of three known vulnerabilities in MS Office to deliver malware to the […]

Read More
Attackers Infect Linux and Windows Servers with RubyMiner

Delaware, USA ā€“ January 18, 2018 ā€“ An unknown hacker group compromises servers with outdated software to infect them with RubyMiner malware. To find such web servers, they use the p0f utility: they are interested in both Linux and Windows servers vulnerable to exploits discovered in 2012 and 2013. Researchers from Checkpoint claim that at […]

Read More