News

Remexi Malware Used in Attacks on Diplomatic Entities

Delaware, USA – February 1, 2019 – Kaspersky Lab’s security researchers published a report on the campaign targeted at Iran-based foreign diplomatic entities by the Chafer APT group. The campaign was conducted in the fall of 2018; adversaries spread an improved version of the Remexi trojan, created in six months before the start of the […]

APT39 Conducts Cyberespionag Operations Targeted at the Middle East

Delaware, USA – January 31, 2019 – The newly discovered Iranian APT group collects personal information about its victims attacking telecommunications and traveling companies. The primary targets of APT39 attacks are located in the Middle East and the United States. FireEye researchers discovered the group’s operations at the end of 2018 and tracked its activities […]

AZORult Comes Back Under the Cloak of Google Update Installer

Delaware, USA – January 30, 2019 – The activity of the updated version of AZORult trojan was noticed in the wild again, the Minerva Lab’s research team informs. The malware is masquerading to be an authentic Google Update installer and once it contaminates a victim machine it replaces a legitimate Google Updater. The replacing malicious […]

Malformed TeamViewer Used to Spread Spyware

Delaware, USA – January 29, 2019 – Trend Micro researchers uncovered a malicious campaign that spreads trojan spyware using a modified version of TeamViewer. A week and a half ago, a security researcher FewAtoms discovered a link to the malicious self-extracting SFX/SEA archive, which, under the guise of a program for remote access, installed a […]

Zero-Day in Total Donations Plugin Allows to Compromise WordPress Websites

Delaware, USA – January 28, 2019 – A critical vulnerability was found in one of the popular WordPress commercial plugins, Wordfence reports. According to the published information, the Total Donations plugin contains an Ajax code which makes the whole WordPress site unsecured and enables remote malicious manipulations like changing core settings or even modifying the […]

The Ursnif Trojan is Capturing Banking Credentials Again

Delaware, USA – January 25, 2019 – Cisco Talos dissected the newest version of Ursnif malware being distributed in the recent campaign and published discovered indicators of compromise in the report. Threat actors behind this version of popular trojan use a surefire way to deliver the payload by attaching an MS Word file containing a […]

Russian Banks Customers Become the Target of Redaman Trojan

Delaware, USA – January 24, 2019 – Financially motivated attackers are targeting victims in Russia this time, the Palo Alto threat intelligence team report. Redaman malware was spot being distributed in malspam attack during last four month of 2018. The emails delivering Redaman targeted recipients mostly with email addresses ending in .ru who conduct transactions […]

Anatova Ransomware Attacks Victims in the US and Western Europe

Delaware, USA – January 23, 2019 – Security researchers of McAfee Labs announced the discovery of a ransomware activity targeting users mainly in the United States and Western Europe. It was called Anatova, based on the name of the ransom message. Anatova is a 64bits application with the compile date of January, 1st, 2019, spread […]

DarkHydrus empowers RogueRobin to use Google Drive

Delaware, USA – January 22, 2019 – The Middle East region became the target of the recent attack by a new strain of RogueRobin Trojan that can use Google Drive to receive attackers’ commands. Cybersecurity experts from 360’s Threat Intelligence Center attributed this attack to the notorious DarkHydrus APT group which has already carried out […]

Renewed XBash Targets Servers Bypassing Cloud Security

Delaware, USA – January 21, 2019 – Cryptocurrency mining malware sustains efforts to be on the edge of the most distributed threats. Researchers from Palo Alto Networks analyzed a new strain of XBash malware that embodies features of ransomware, coinminers, botnets, and worms to affect Linux servers, with the new code being able to bypass […]