HackDig : Dig high-quality web security articles for hacker

Gaza Cybergang – updated activity in 2017:

1. Summary information The Gaza cybergang is an Arabic-language, politically-motivated cybercriminal group, operating since 2012 and actively targeting the MENA (Middle East North Africa) region. The Gaza cybergang’s attacks have never slowed down and its typical targets include government entities/embassies, oil and gas, media/press, activists, politi
Publish At:2017-10-30 15:55 | Read:219 | Comments:0 | Tags:APT reports APT Arabic Malware Macros Mobile Malware Targete

URSNIF spam campaign expose new macro evasion tactics

Trend Micro recently observed a new campaign leveraging the Ursnif banking Trojan using new malicious macro tactics payload delivery and evade detection. Researchers at Trend Micro have recently spotted a new campaign leveraging the Ursnif banking Trojan featuring new malicious macro tactics for payload delivery. Malicious macros are widely adopted by crook
Publish At:2017-10-22 06:06 | Read:232 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime macros

Zero-Day Malware Poses a Growing Threat

For much of the general public, including the enterprise world, security protection is synonymous with antivirus software. Security professionals, by contrast, have long understood that this applied to only one layer of protection and was by no means the most crucial. Indeed, the security community looks first to other defenses, such as keeping software secu
Publish At:2017-05-02 00:35 | Read:674 | Comments:0 | Tags:Fraud Protection Network Macro Malware Macros Malware Zero-D

KopiLuwak: A New JavaScript Payload from Turla

On 28 January 2017, John Lambert of Microsoft (@JohnLaTwC) tweeted about a malicious document that dropped a “very interesting .JS backdoor“. Since the end of November 2016, Kaspersky Lab has observed Turla using this new JavaScript payload and specific macro variant. This is a technique we’ve observed before with Turla’s ICEDCOFFEE p
Publish At:2017-02-02 20:35 | Read:1941 | Comments:0 | Tags:Blog Featured Research APT JavaScript Macros Turla

Are You Hiring? GoldenEye Ransomware Wants to Meet Your HR Department

GoldenEye ransomware wants to interview with your company’s HR department, but it’s not interested in filling an open position.For this new campaign, GoldenEye has assumed a job application theme to target German speakers in companies’ HR departments. The authors of the ransomware, which is an updated form of Petya, know it’s part of
Publish At:2017-01-05 21:40 | Read:1118 | Comments:0 | Tags:Latest Security News GoldenEye HR macros Petya ransomware

Two versions of the new Cerber 5.0 ransomware released in a few days

Security experts from the CheckPoint firm discovered two different variants of the new Cerber 5.0 ransomware in a few weeks. Security experts have spotted a new variant of the dreaded Cerber ransomware, the Cerber 5.0. This is the third version of the malware released this week that is able to encrypt files on all accessible network shares. The Cerber ransom
Publish At:2016-11-28 10:45 | Read:1062 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cerber 5.0 Cerber ransomwa

Microsoft Office 365 targeted with massive Cerber ransomware 0-day campaign

Cloud security provider Avanan discovered a number of Cerber Ransomware variants targeting corporate Office 365 users with malicious emails. Cloud security provider Avanan spotted a number of Cerber Ransomware variants that are targeting corporate Office 365 users with spam or phishing emails leveraging on malicious file attachments. Threat actors sent an Of
Publish At:2016-06-28 19:15 | Read:1458 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cerber ransomware Cybercri

Microsoft warns of malicious macros using a new sneaky trick

Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a new sneaky trick. Researchers at Microsoft’s Malware Protection Center are warning of a new technique attackers are using to allow macro malware elude detection solutions. The experts first spotted the technique while analyzing a
Publish At:2016-05-22 12:05 | Read:1074 | Comments:0 | Tags:Breaking News Cyber Crime Malware macros malware Microsoft P

Locky: the encryptor taking the world by storm

In February 2016, the Internet was shaken by an epidemic caused by the new ransomware Trojan Locky (detected by Kaspersky Lab products as Trojan-Ransom.Win32.Locky). The Trojan has been actively propagating up to the present day. Kaspersky Lab products have reported attempts to infect users with the Trojan in 114 countries around the world. Analysis of the s
Publish At:2016-04-06 09:20 | Read:2671 | Comments:0 | Tags:Blog Featured Research Macros Malware Descriptions Malware T

It’s 2016, so why is the world still falling for Office macro malware?

In the late 1990s, Microsoft Office macros were a favorite vehicle for surreptitiously installing malware on the computers of unsuspecting targets. Microsoft eventually disabled the automated scripts by default, a setting that forced attackers to look for new infection methods. Remotely exploiting security bugs in Internet Explorer, Adobe Flash, and other wi
Publish At:2016-03-04 18:40 | Read:1838 | Comments:0 | Tags:Risk Assessment Technology Lab Excel exploits macros malware

VBE files on the rise in Brazil leading to Financial Fraud

Security experts at Kaspersky Lab recently observed a big wave of malicious VBE files targeting Brazilian users to distribute Financial Trojan. Recently security experts have seen old tricks rising from the dead (like for example word/excel macros attachment in e-mails) and malicious VBE files are being spread via email target
Publish At:2015-08-11 23:35 | Read:1259 | Comments:0 | Tags:Breaking News Cyber Crime Malware banking trojan Cybercrime

Don't Feel Left Out: Ransomware for IT Security Enthusiasts!

Macros are so hot right now It's getting dark outside and our favorite mail client beeps with excitement for a new missive in our inbox, something interesting perhaps? A rapid glimpse at the contents of the message should indicate that a malicious campaign will play the starring role in what follows. An included attachment reveals itself as a malicious
Publish At:2015-04-07 17:00 | Read:1306 | Comments:0 | Tags:Blog Research Macros Malicious spam Malware Technologies Mic

Latest Dridex Campaign Evades Detection with AutoClose Function

Pushers of the Dridex banking malware have gone old-school for some time now, moving the malware through phishing messages executed by macros in Microsoft Office documents.While macros are disabled by default since the release of Office 2007, the malware includes somewhat convincing social engineering that urges the user to enable macros—with directions incl
Publish At:2015-03-20 17:00 | Read:1205 | Comments:0 | Tags:Malware Web Security AutoClose Banking Malware Dridex bankin

Spam campaign spreads Dridex Trojan via Macros in XML Files

Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml documents. Early 2015 security experts discovered a variant of banking malware dubbed Dridex that was spread through a phishing campaign using Microsoft Excel documents embedding malicious macro to
Publish At:2015-03-09 09:30 | Read:807 | Comments:0 | Tags:Breaking News Cyber Crime Malware banking trojan Cybercrime

Dridex Banking Trojan Spreading Via Macros in XML Files

Not long ago, criminals pushing the Dridex banking Trojan were using Microsoft Excel documents spiked with a malicious macro as a phishing lure to entice victims to load the malware onto their machines.Even though macros are disabled by default inside most organizations, the persistent hackers are still at it, this time using XML files as a lure. Research
Publish At:2015-03-06 16:45 | Read:842 | Comments:0 | Tags:Malware Web Security Banking Malware Cridex Dridex banking T

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud