News

Malta’s Staminal Bank of Valletta Victimized by Overseas Hackers

Delaware, USA – February 15, 2019 – Another bank was brought to ensure its customers about their accounts’ being effectively protected and unaffected after the security breach. Bank of Valletta with the Maltese Government being its largest stakeholder had to knock off its services including email services, operations with cards, internet and mobile banking, and […]

Astaroth Malware Abuses Antivirus Tools to Steal Data

Delaware, USA – February 14, 2019 – The infamous Astaroth trojan started to exploit antivirus solutions to hide its activities and download additional modules. Cybereason researchers analyzed a new campaign targeting the countries of South America and Europe and discovered that adversaries found a way to abuse solutions popular in these regions (Avast and security […]

Tweaked EXE Snakes Into MacOS

Delaware, USA – February 13, 2019 – Adversaries are constantly looking for ways to infect Mac systems with malware bypassing Gatekeeper, and sometimes they succeed. Unexpectedly a .exe file overbore MacOS native security protection tool that enabled it to deploy the malicious file, Trend Micro researchers reported. A new malware delivering campaign hits victims in […]

New Linux Malware Hunts Its Predecessor to Mine Cryptonight

Delaware, USA – February 12, 2019 – A new round of evolution of coinmining infections on Linux systems. In the second half of 2018, attacks on Linux servers became more frequent: in September, cross-platform malware XBash started its attacks on Windows and Linux servers, and in less than two months, adversaries began the active distribution […]

Mario Hits to Let Off GandCrab Ransomware

Delaware, USA – February 11, 2019 – Another geo-targeted threat was detected being spread posing as a payment notice with a .xls attachment understandably conducing the receiver to open the attachment and to enable its content, Bromium researchers informed. Once the attachment is opened, the macro runs the country settings on the attacked system to […]

US State Agency Hit by QakBot Malware

Delaware, USA – February 8, 2019 – A new spam campaign spreading a banking trojan was reported by Cofense researchers. The notorious Emotet botnet is now delivering more advanced malware targeting the US governmental institution. The campaign to deliver the QakBot malware performed typically of Emotet behavior delivering the destructive Office document with macros and […]

ExileRAT Campaign Has Tibetan Government in Its Sights

Delaware, USA – February 7, 2019 – A harmful PPSX document was delivered in terms of the recent malware campaign under the pretense on Central Tibetan Administration and targeting their subscribers’ mailing list, Talos’ security research team reports. The new ExileRAT campaign uses old features like information stealing and uploading and downloading the files but […]

SpeakUp Backdoor Used to Install Monero Miners on Linux Servers

Delaware, USA – February 6, 2019 – The new campaign targets Linux and MacOS systems primarily in Asia, Central and South America. Checkpoint’s researchers discovered that adversaries use SpeakUp backdoor to gain access to the systems and install the infamous XMRig for mining Monero cryptocurrency. For initial infection, they exploit CVE-2018-20062 vulnerability that allows them […]

CookieMiner Malware for Mac Steals Credentials and Credit Card Data

Delaware, USA – February 5, 2019 – A new threat for Mac users is designed to steal credentials and browser cookies, as well as cryptocurrency wallet data and keys. At the end of last year, several new malware strains for Mac were discovered, and adversaries used some pieces of code from them to create CookieMiner. […]

LockerGoga Freezes Operations of Altran Сompany

Delaware, USA – February 4, 2019 – Daily operations of the global leader in engineering and R&D services fell down being affected by LockerGoga ransomware that encrypted files spreading throughout the company network. In their press release, the company informed about stopping all the applications and IT network and starting investigation and recovery. Although the […]