HackDig : Dig high-quality web security articles for hacker

Matrix Ransomware being distributed through malvertising

Security expert Jérôme Segura from Malwarebytes has spotted that Matrix Ransomware has risen again, it is now being distributed through malvertising. Malware researcher Jérôme Segura from Malwarebytes has discovered that Matrix Ransomware is now being distributed through malvertising campaign. #RIGEK drops Matrix ransomware. Payload https://t.co/PruaiZRuw9
Publish At:2017-10-29 22:20 | Read:2565 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Hacking malvert

ProMediads Malvertising and Sundown-Pirate Exploit Kit Combo Drops Ransomware and Info Stealer

With additional insights/analysis from Chaoying Liu We’ve uncovered a new exploit kit in the wild through a malvertising campaign we’ve dubbed “ProMediads”. We call this new exploit kit Sundown-Pirate, as it’s indeed a bootleg of its precursors and actually named so by its back panel. ProMediads has been active as early as 2016, employing Rig and Sundown exp
Publish At:2017-07-19 15:35 | Read:2606 | Comments:0 | Tags:Bad Sites Exploits exploit kit LockPOS malvertising ProMedia

A fresh massive AdGholas Malvertising campaign infects millions

Researchers at Proofpoint discovered a massive AdGholas Malvertising Campaign infecting as many as 1 million computers per day with several banking trojans. A new massive AdGholas malvertising network discovered by experts at Proofpoint has been infecting as many as 1 million computers per day with several banking trojans. AdGholas operators have been active
Publish At:2017-07-04 19:20 | Read:1692 | Comments:0 | Tags:Breaking News AdGholas Angler EK Cybercrime malvertising mal

AdGholas Malvertising Campaign Employs Astrum Exploit Kit

At the end of April this year, we found Astrum exploit kit employing Diffie-Hellman key exchange to prevent monitoring tools and researchers from replaying their traffic. As AdGholas started to push the exploit, we saw another evolution: Astrum using HTTPS to further obscure their malicious traffic. We spotted a new AdGholas malvertising campaign using the A
Publish At:2017-06-20 11:50 | Read:4071 | Comments:0 | Tags:Bad Sites Ransomware AdGholas Astrum exploit kit malvertisin

Malvertising campaign in Google Search redirected users to tech support scam

Malicious ads in Google search results for the US retail giant Target redirected users to a tech support scam. The malvertising campaign was first reported last week by a US user who posted his observations to a StackExchange thread and was then reported by Bleepingcomputer.com. Just querying Google for the term “target,” users were displayed on
Publish At:2017-06-06 09:55 | Read:2354 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime Google malverti

GootKit Malvertising Brings Redirection Attacks to Italian Banks

Earlier in May, I reported that GootKit had launched redirection attacks for the first time. The malware prepared for its new modus operandi in the U.K., targeting major banks there with this advanced browsing manipulation attack. I also predicted that this was just a test and that we’re about to see more. That prediction has come true. GootKit officia
Publish At:2017-05-24 00:45 | Read:3017 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Threat

The HP EliteBook is Shipping – You Are Free to Safely Browse the Internet

As we announced in February, HP Sure Click begins shipping on the new HP EliteBook x360 starting today. This beauty not only has a secure BIOS but also offers secure browsing – security built-in, not bolted-on. With this launch, virtualization-based security goes completely mainstream, direct to the prosumer. We are so pleased to share the news that
Publish At:2017-04-18 20:30 | Read:2726 | Comments:0 | Tags:Company News End Users browsing Chrome Edge EliteBook x360 H

CVE-2017-0022 Windows Zero-Day flaw used by AdGholas hackers and it was included in Neutrino EK

The recently patched CVE-2017-0022 Windows Zero-Day vulnerability has been exploited by threat actors behind the AdGholas malvertising campaign and Neutrino EK since July 2016. Microsoft has fixed several security flaws with the March 2017 Patch Tuesday updates. According to security experts at Trend Micro, the list of fixed vulnerabilities includes three fl
Publish At:2017-03-26 01:15 | Read:2980 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware AdGholas CVE-2017-

Malicious Chrome Extension Punishes Users with Tech Support Scam

A malicious Google Chrome extension punishes users who search for certain keywords by redirecting them to a tech support scam.Attackers introduce users to the rogue extension via a malvertising campaign. Most of the time, malicious adverts redirect users to an exploit kit that installs ransomware or other baddies. In this case, the advertisement leads a user
Publish At:2017-02-23 14:05 | Read:2673 | Comments:0 | Tags:Latest Security News Chrome Malvertising scam

Stegano campaign exposed millions netizens via attack code in pixels of ads banners

Stegano campaign – Millions of people visiting major websites may have been infected with malicious code that was embedded in pixels of the ads banners. A single pixel could be used to compromise your PC, millions of people visiting major websites over the past months may have been infected with malicious code that was embedded in pixels of the ads ban
Publish At:2016-12-07 15:45 | Read:2383 | Comments:0 | Tags:Breaking News Cyber Crime Malware cybercrme exploit kit Hack

CVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas Campaign

Microsoft’s Patch Tuesday for October fixed another previous zero-day vulnerability in Internet Explorer (IE) via MS16-118 and MS16-126: CVE-2016-3298. Before the lid was put on it, the security flaw was employed alongside CVE-2016-3351 by operators of the AdGholas malvertising campaign, analysis and disclosure of which were made with our collaboration with
Publish At:2016-11-19 12:05 | Read:2676 | Comments:0 | Tags:Exploits Vulnerabilities AdGholas CVE Internet Explorer malv

Bizarro Sundown Exploit Kit Distributing Locky Ransomware via ShadowGate

The Bizarro Sundown exploit kit is spreading two versions of Locky ransomware via the still-active ShadowGate malvertising campaign.In October, Trend Micro spotted two versions of Bizarro Sundown, a modification of the earlier Sundown exploit kit which rose to prominence with RIG following Neutrino’s demise.The first iteration reared its ugly head at t
Publish At:2016-11-04 20:25 | Read:2334 | Comments:0 | Tags:Latest Security News Bizarro Sundown Exploit Kit Malvertisin

The Impact of the JohnyCryptor Ransomware

What has caused a seemingly typical ransomware from turning into one of the most popular malware threats this year? I’ve uncovered the facts, so allow me to give some insight into how this ransomware became one of the most feared strains this year.The First Johnycryptor Ransomware Major HitsIn early July 2016, various security vendors spotted the first
Publish At:2016-11-04 02:05 | Read:2298 | Comments:0 | Tags:Cyber Security Featured Articles decryption exploit kits Joh

RIG Exploit Kit the Final Destination of HookAds Malvertising Campaign

The HookAds malvertising campaign redirects users to a landing page for the RIG exploit kit that comes prepackaged with all types of baddies.HookAds, which got its name from a string found by Malwarebytes researchers in the delivery URL, works as follows.A malvertising chain redirects visitors to adult websites that sometimes generate millions of views a mon
Publish At:2016-11-02 13:25 | Read:2146 | Comments:0 | Tags:Latest Security News Exploit Kit Flash Malvertising RIG expl

Experts observed several malvertising campaigns deliver Cerber 4.0

Cerber 4.0 is the latest variant of the Cerber ransomware family that is becoming even more common in the malvertising campaign in the wild. Another variant of the notorious Cerber ransomware, the Cerber 4.0, appeared in the wild delivered by several exploit kits, including RIG, Neutrino, and Magnitude EKs. According to the experts from Trend Micro, the Cerb
Publish At:2016-10-13 10:30 | Read:2406 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cerber 4.0 Cybercrime Hack


Share high-quality web security related articles with you:)


Tag Cloud