HackDig : Dig high-quality web security articles for hacker

Dridex Operators Continue to Target Financial Services, DHS Warns

The Dridex Trojan continues to pose a significant threat to user data and its operators are expected to continue using it in attacks targeting the financial services sector, the Department of Homeland Security warns.A successor of the Cridex Trojan, Dridex has been around since 2012 and has been considered one of the most prevalent financial threats for more
Publish At:2019-12-09 12:00 | Read:126 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Bayrob Malware Operators Get Lengthy Prison Sentences

Two Romanian nationals have been sentenced to prison in the United States for their roles in a multi-million dollar online fraud operation.The two, Bogdan Nicolescu, 37, and Radu Miclaus, 37, of Bucharest, Romania, will go to prison for developing and operating the Bayrob malware, infecting over 400,000 computers, and stealing credit card and other sensitive
Publish At:2019-12-09 10:15 | Read:123 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Fraud & Identity

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

Whether it be that their shoes are too tight, their heads aren’t screwed on just right, or they’re expressing a little bit of “Bah Humbug,” cyber-grinches and cyber-scrooges everywhere view the holiday season as a perfect opportunity to exploit users. In fact, McAfee recently conducted a survey of over 1,000 adults over the age of 18 in the U.S. from October
Publish At:2019-12-06 16:45 | Read:293 | Comments:0 | Tags:Consumer Threat Notices identity theft malware mobile securi

7 Ways to Wreck a Cybercrook’s Holidays

’Tis the season for giving and who better to give a giant headache to than the digital scammers working overtime to wreck our holidays? Can we spot and unravel every scam out there? Probably not. But, by taking a few minutes to get equipped to click, we can dodge common traps laid by cybercrooks and wreck their holidays before they get a chance to wreck ours
Publish At:2019-12-06 16:45 | Read:267 | Comments:0 | Tags:Family Safety cybercrime identity theft malware computer sec

BotConf 2019 Wrap-Up Day #3

It’s a classic issue for BotConf attendees, the last day is always a little bit stronger due to the social event organized every Thursday night. This year, we are in the French area where good wines are produced and the event took place at the “Cité du Vin”. The night was short but I was present at the first talk! Ready as usual! The first talk was “
Publish At:2019-12-06 15:20 | Read:94 | Comments:0 | Tags:Event Security Bordeaux Botconf Conference Malware

North Korean MacOS Malware Adopts In-Memory Execution

A new piece of macOS malware linked to the North Korean hacking group Lazarus employs in-memory execution of payloads, researchers revealed this week.Active since at least 2009, Lazarus was first observed using macOS malware in attacks in August last year, but continued to do so as part of a campaign that was active in 2019.Recent Lazarus campaigns focused o
Publish At:2019-12-06 10:15 | Read:69 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign

by William Gamazo Sanchez and Joseph C. Chen In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws. During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristic
Publish At:2019-12-04 14:35 | Read:187 | Comments:0 | Tags:Exploits Malware Capesand KurdishCoder exploit

Iran-Linked ZeroCleare Wiper Targets Energy, Industrial Sectors in Middle East

Researchers at IBM X-Force have come across what appears to be a new piece of malware that has been used in highly targeted attacks aimed at energy and industrial organizations in the Middle East.Dubbed ZeroCleare based on a path in its binary file, the malware has been described by IBM as a destructive wiper and it has been linked to Iranian hacker groups.
Publish At:2019-12-04 12:01 | Read:104 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

New 'PyXie' RAT Used Against Multiple Industries

A new Python-based remote access Trojan (RAT) has been used in campaigns targeting a wide range of industries, BlackBerry Cylance revealed this week.Dubbed PyXie, the malware has been active since last year, but received little attention, although it has been observed in conjunction with Cobalt Strike beacons and a downloader seemingly linked to the Shifu ba
Publish At:2019-12-04 12:01 | Read:129 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

New version of IcedID Trojan uses steganographic payloads

This blog post was authored by @hasherezade, with contributions from @siri_urz and Jérôme Segura. Security firm Proofpoint recently published a report about a series of malspam campaigns they attribute to a threat actor called TA2101. Originally targeting German and Italian users with Cobalt Strike and Maze ransomware, the later wave of malicious emails w
Publish At:2019-12-03 16:50 | Read:162 | Comments:0 | Tags:Threat analysis backdoor banking Trojan banking Trojans cred

'StrandHogg' Vulnerability Exploited by Malicious Android Apps

Norwegian app security company Promon on Monday disclosed the existence of a vulnerability that has been exploited by tens of malicious Android apps, and warned that hundreds of popular applications are at risk of being targeted.Promon has dubbed the flaw StrandHogg, which is an old Norse term describing a Viking tactic that involved raiding coastal areas to
Publish At:2019-12-02 22:15 | Read:255 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Malware Vulnerabilities

International Law Enforcement Operation Targets IM-RAT Malware

A worldwide law enforcement operation has resulted in the Imminent Monitor Remote Access Trojan (IM-RAT) being taken down completely, Europol has announced.Designed to provide its users with full control over the victim computers, IM-RAT was being used across 124 countries and over 14,500 people paid to use it.The takedown, Europol announced, was the result
Publish At:2019-12-02 10:15 | Read:283 | Comments:0 | Tags:NEWS & INDUSTRY Malware Tracking & Law Enforcement C

Malware Found on Payment System Used by On The Border Restaurants

Tex-Mex restaurant chain On The Border has informed customers this week that their payment card information may have been stolen by hackers.The breach was discovered on November 14 and at this point in the investigation the company believes the incident impacts restaurants in 27 states, including Arizona, Arkansas, Colorado, Connecticut, Florida, Georgia, Il
Publish At:2019-11-30 10:15 | Read:259 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Dexphot Malware Uses Randomization, Encryption, and Polymorphism to Evade Detection

Malware that Microsoft has been tracking for over a year has been leveraging numerous techniques for evasion, including random file names, fileless installation, and polymorphism. Microsoft, which calls the malware Dexphot, noticed that it attempted to deploy files that changed two or three times per hour. Targeting thousands of devices, the polymorphic
Publish At:2019-11-30 10:15 | Read:135 | Comments:0 | Tags:NEWS & INDUSTRY Malware

Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

By Joey Chen, Hiroyuki Kakara and Masaoki Shoji While we have been following cyberespionage group TICK (a.k.a. “BRONZE BUTLER” or “REDBALDKNIGHT”) since 2008, we noticed an unusual increase in malware development and deployments towards November 2018. We already know that the group uses previously deployed malware and modified tools for obfuscation, but we a
Publish At:2019-11-30 07:35 | Read:115 | Comments:0 | Tags:Bad Sites Exploits Internet of Things Malware Open source Sp


Share high-quality web security related articles with you:)


Tag Cloud