HackDig : Dig high-quality web security articles for hackers

It’s baaaack: Public cyber enemy Emotet has returned

It was never a question of “if” but “when”. After five months of absence, the dreaded Emotet has returned. Following several false alarms over the last few weeks, a spam campaign was first spotted on July 13 showing signs of a likely comeback. The Emotet botnets started pushing malspam actively on Friday, July 17, using the same te
Publish At:2020-07-17 17:37 | Read:636 | Comments:0 | Tags:Trojans emotet spam

Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Akshay Bhargava, Chief Product Officer of Malwarebytes, about the similarities between coronavirus and computer viruses. We discuss computer virus prevention, detection, and response, and the simple steps that consum
Publish At:2020-04-13 16:54 | Read:972 | Comments:0 | Tags:Podcast Android bad apps computer virus coronavirus covid-19

Coronavirus scams, found and explained

Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this global pandemic is expanding their horizons. In the past week, Malwarebytes discovered multiple email scams that prey on the fear, uncertainty, and confusion regarding
Publish At:2020-03-20 13:11 | Read:1104 | Comments:0 | Tags:Scams 1 470 59828 93 784 50 17 Agent Tesla Boresha Credit Se

Malwarebytes Labs releases 2020 State of Malware Report

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a doozy. From an increase in enterprise-focused threats to the diversification of sophisticated hacking and stealth techniques, the 2019 threat landscape was shaped by a cybercrime industry that aimed to show i
Publish At:2020-02-11 04:50 | Read:1418 | Comments:0 | Tags:Reports 2020 state of malware report adware Android android

New version of IcedID Trojan uses steganographic payloads

This blog post was authored by @hasherezade, with contributions from @siri_urz and Jérôme Segura. Security firm Proofpoint recently published a report about a series of malspam campaigns they attribute to a threat actor called TA2101. Originally targeting German and Italian users with Cobalt Strike and Maze ransomware, the later wave of malicious emails w
Publish At:2019-12-03 16:50 | Read:1619 | Comments:0 | Tags:Threat analysis backdoor banking Trojan banking Trojans cred

A week in security (November 11 – 17)

Last week on Malwarebytes Labs, we offered statistics and information on a sneaky new Trojan malware for Android, inspected a bevy of current Facebook scams, and explained the importance of securing food and agriculture infrastructure. We also released our latest report on cybercrime tactics and techniques, offering new telemetry about the many cybersecu
Publish At:2019-11-18 16:50 | Read:1506 | Comments:0 | Tags:A week in security CTNT cybercrime tactics & techniques cybe

Stealthy new Android malware poses as ad blocker, serves up ads instead

Since its discovery less than a month ago, a new Trojan malware for Android we detect as Android/Trojan.FakeAdsBlock has already been seen on over 500 devices, and it’s on the rise. This nasty piece of mobile malware cleverly hides itself on Android devices while serving up a host of advertisements: full-page ads, ads delivered when opening the default brows
Publish At:2019-11-14 16:50 | Read:1066 | Comments:0 | Tags:Android ads blocker android malware android trojan Android/T

They can remotely access and control my computer?

We are always talking about ransomware and the importance of keeping your corporate network protected, and we want to warn our readers about the popular Trojan attacks that are going after small and medium sized businesses. But how do you know when it’s a Trojan? How can you secure yourself against Trojans? 5 Things You Should Know They are maliciou
Publish At:2016-10-13 20:20 | Read:3884 | Comments:0 | Tags:Malware Mobile News highlighted infographic tips trojans

Linux Security – The Next Big Target for Cyber Criminals

As the cyber security threats continue to evolve and expand upon both consumers and companies, we observe a shift from the traditional Trojans and Worms to more complex malware that can truly devastate a system.The contemporary viruses execute their payloads in stages and can dynamically affect different parts of the target system. The biggest problem is no
Publish At:2016-09-29 15:55 | Read:4174 | Comments:0 | Tags:Cyber Security Featured Articles GNOME KDE Linux ransomware

Brazen no more, makers of account-draining bank trojan get 24 years

Two men who built and sold a banking trojan that infected more than 50 million computers around the world and caused almost $1 billion in losses have been sentenced to a combined 24 years in prison.Aleksandr Andreevich Panin, the chief developer and distributor of SpyEye, received a sentence of nine years and six months in federal prison, according to a stat
Publish At:2016-04-21 22:10 | Read:3509 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab Uncategorized

CoreBot Adds New Capabilities, Transitions to Banking Trojan

As researchers expected it would, CoreBot, the credential-stealing malware that surfaced last month, has added a bevy of new capabilities and reinvented itself as a robust banking Trojan.Researchers said the malware shares more similarities with Dyre, another high profile banking Trojan, than a run of the mill data-stealing Trojan.Perhaps the malware’s
Publish At:2015-09-16 03:40 | Read:3352 | Comments:0 | Tags:Malware Web Security Banking trojans CoreBot Damballa Financ

Powerful, highly stealthy Linux trojan may have infected victims for years

Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.The previously undiscovered malware represents a missing puzzle piece tied to "Turla," a so-called advanced persistent threat (APT) disclosed in August by Kaspersk
Publish At:2014-12-09 04:20 | Read:2810 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab backdoors espi

DroidJack RAT: A tale of how budding entrepreneurism can turn to cybercrime

Small-scale mobile app software entrepreneurship has been described as the cottage industry of the 21st century. It allows talented software developers to apply their skills to create new and innovative mobile apps, with the hope of becoming the next big thing and, perhaps, even attaining the trappings of wealth associated with success. However,
Publish At:2014-11-25 12:55 | Read:7031 | Comments:1 | Tags:Security Security Response Endpoint Protection (AntiVirus) A

Active “WireLurker” iPhone infection ushers in new era for iOS users

Ushering in a new threat landscape for iPhone users, security researchers have uncovered an active malware operation that compromised the OS X and iOS devices of hundreds of thousands of people.WireLurker, as the new family of malware has been dubbed, first took hold of Macs when users installed pirated software that had been laced with malicious code, acc
Publish At:2014-11-07 02:30 | Read:3638 | Comments:0 | Tags:Infinite Loop Risk Assessment iPads iPhones malware trojans

Mobile Attacks: Cybercriminals' New Cash Cow

Cybercrime is worth big money. So as people move away from using PCs and toward smartphones and tablets as their primary computing devices, digital crooks have taken note. Mobile devices are the next big target for cybercriminals looking to make quick cash, and according to the 2013 Norton Report, 38 percent of smartphone users have already been
Publish At:2014-08-15 01:13 | Read:3886 | Comments:0 | Tags:Security Symantec Security Insights Blog Android Tapsnake de

Tools