HackDig : Dig high-quality web security articles

Chinese Hackers Are Now Using the Nimbda Loader and a New Form of the Yahoyah Trojan

Tropic Trooper is an independent terrorist organization that has conducted operations directed at specific targets in Taiwan, the Philippines, and Hong Kong. Since 2011, Tropic Trooper has been operating with the goal of targeting organizations in the public sector, the healthcare industry, the transportation sector, and the high technology sector.What Happe
Publish At:2022-06-23 09:42 | Read:487 | Comments:0 | Tags:Cybersecurity News trojan hack

APT ToddyCat

ToddyCat is a relatively new APT actor that we have not been able to relate to other known actors, responsible for multiple sets of attacks detected since December 2020 against high-profile entities in Europe and Asia. We still have little information about this actor, but we know that its main distinctive signs are two formerly unknown tools that we call &#
Publish At:2022-06-21 06:17 | Read:681 | Comments:0 | Tags:APT reports APT Backdoor Dropper Encryption Malware Descript

Mobile Banking Heists: The Emerging Threats and How to Respond

The landscape of modern banking and financial management has evolved with the rise of digital access to assets on a global scale. From payments to cryptocurrencies, banking to investments, the financial industry has turned the mobile phone into a personal ATM for each customer. But with this evolution and digital growth comes new threats to each customerR
Publish At:2022-06-02 19:22 | Read:993 | Comments:0 | Tags:App Security Financial Services Mobile Security Threat Resea

ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups

IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. The results of this research, along with evidence gained from the disclosure of internal ITG23 chat logs (“Contileaks”), provide new
Publish At:2022-05-19 06:20 | Read:1109 | Comments:0 | Tags:Malware Security Services Threat Intelligence Threat Researc

Mobile subscription Trojans and their little tricks

Billing fraud is one of the most common sources of income for cybercriminals. There are currently a number of known mobile Trojans specializing in secretly subscribing users to paid services. They usually pay for legitimate services in a user’s name and scammers take a cut from the money billed. These types of subscription fees tend to be fleeced from
Publish At:2022-05-06 06:09 | Read:990 | Comments:0 | Tags:Malware descriptions Google Android Malware Malware Descript

How to recover files encrypted by Yanluowang

Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter team as they were investigating an incident on a large corporate network. Kaspersky experts have found a vulnerability in the Yanluowang encryption algorithm and created a free decryptor to help victims of this ransomware with recovering their files. Yanluowang description T
Publish At:2022-04-25 07:21 | Read:1409 | Comments:0 | Tags:Malware descriptions Cybercrime Malware Technologies Ransomw

How to recover files encrypted by Yanlouwang

p>Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter team as they were investigating an incident on a large corporate network. Kaspersky experts have found a vulnerability in the Yanluowang encryption algorithm and created a free decryptor to help victims of this ransomware with recovering their files. Yanluowang description
Publish At:2022-04-18 10:05 | Read:1903 | Comments:0 | Tags:Malware descriptions Cybercrime Malware Technologies Ransomw

Lazarus Trojanized DeFi app for delivering malware

p>For the Lazarus threat actor, financial gain is one of the prime motivations, with a particular emphasis on the cryptocurrency business. As the price of cryptocurrency surges, and the popularity of non-fungible token (NFT) and decentralized finance (DeFi) businesses continues to swell, the Lazarus group’s targeting of the financial industry keeps evo
Publish At:2022-03-31 10:04 | Read:849 | Comments:0 | Tags:APT reports Backdoor Financial malware Google Chrome Lazarus

Threat landscape for industrial automation systems, H2 2021

2021 is the second year we have spent living and working in the pandemic. By 2021 everyone got used to pandemic limitations – industrial organization employees and IT security professionals and threat actors. If we compare the numbers from 2020 and 2021, we see that 2021 looks more stable, particularly in H2. H2 2021 Report at a glance The full report is ava
Publish At:2022-03-03 07:21 | Read:1013 | Comments:0 | Tags:Industrial threats Backdoor Industrial control systems Keylo

Mobile malware evolution 2021

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Figures of the year In 2021, Kaspersky mobile products and technologies detected: 3,464,756 malicious installation packages 97,661 new mobile banking Trojans 17,372 new mobile ransomware Trojans Trends of the year In 2021,
Publish At:2022-02-21 11:16 | Read:1984 | Comments:0 | Tags:Malware reports Adware Apple iOS Data theft Google Android M

How iOS Malware May Snoop on Our Devices

Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t have them. We carry so much of our lives on our devices, from our social media accounts and photos of our pets to our banking information and home addresses. Whether it be just for fun or for occupational purposes, so much of our time and attention is s
Publish At:2022-02-07 04:53 | Read:1116 | Comments:0 | Tags:Consumer Cyber Awareness malware trojan IOS malware IOS

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogra
Publish At:2022-02-02 14:03 | Read:2003 | Comments:0 | Tags:Endpoint Fraud Protection Malware Threat Research IBM X-Forc

Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data

Shopping online is an increasingly popular endeavor, and it has accelerated since the COVID-19 pandemic. Online sales during the 2021 holiday season rose nearly 9% to a record $204.5 billion. Mastercard says that shopping jumped 8.5% this year compared to 2020 and 61.4% compared to pre-pandemic levels. Cyber criminals are not missing this trend. The Ramnit
Publish At:2022-01-31 14:03 | Read:4054 | Comments:0 | Tags:Advanced Threats Malware Security Services ATM Malware Banki

Latest Proof of Concept Details How iOS Malware May Snoop on Our Devices

Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t have them. We carry so much of our lives on our devices, from our social media accounts and photos of our pets to our banking information and home addresses. Whether it be just for fun or for occupational purposes, so much of our time and attention is s
Publish At:2022-01-30 21:01 | Read:2395 | Comments:0 | Tags:Consumer Cyber Awareness malware trojan IOS malware IOS

BRATA Android Trojan Returns with Fury

Marking its most aggressive comeback to the Android ecosystem since its discovery in 2019, the BRATA Android malware has targeted global victims and their banking applications with new tricks up its sleeve. First discovered targeting Brazilian Android users in 2019 by Kaspersky, the remote access trojan (RAT) has been updated, targeting more potential vi
Publish At:2022-01-25 18:53 | Read:1499 | Comments:0 | Tags:Android Mobile Security Threat Research BRATA Android malwar

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud