Hackers Have Been Sending Malware-Filled USB Sticks to U.S. Companies Disguised as Presents

GizModo VR

Using friendly-looking USB sticks as a vector for malware distribution is a trick as old as the internet itself and, apparently, it’s still quite popular with the criminals.

Dell Data Protection Protected Workspace & Malware Prevention

CTOvision

The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The evolution of malware has gone from low sophistication, such as script kiddies, to nation states (tier 1), who are more skilled and who specifically target individuals, or industries with data they intend to infiltrate. The malware is from external agents. Malware is all new, and we need to focus on containment and isolation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Joker malware identified in Google Play Store app downloaded 500,000 times

TechSpot

Cybersecurity researchers at Pradeo regularly update an article identifying mobile applications available on the Google Play Store infected with Joker malware.

MSRT vs. MSERT: When to use each Windows malware tool

Computerworld Vertical IT

Microsoft provides Windows users with two tools that offer malware scanning and repair services, should those scans turn up anything in need of fixing. To read this article in full, please click here (Insider Story

How one coding error turned AirTags into perfect malware distributors

Computerworld Vertical IT

Compared with their laptop and desktop ancestors, they make it far more difficult to check that URLs are proper, that SPAM/malware texts/emails don’t get opened and that emlpoyees follow the minimal cybersecurity precautions IT asks. To read this article in full, please click here

Researchers find malware samples that exploit Meltdown and Spectre

Network World

Once Google published its findings for the Meltdown and Spectre vulnerabilities in CPUs, the bad guys used that as a roadmap to create their malware. And so far, researchers have found more than 130 malware samples designed to exploit Spectre and Meltdown. To read this article in full, please click hereIt was inevitable.

Microsoft did door-to-door router replacements to stop Trickbot malware

The Verge

Microsoft says it’s gone door-to-door replacing routers compromised with the Trickbot malware in Brazil and Latin America, hoping to squash an international hacking group. Illustration by Alex Castro / The Verge.

Non-malware attacks are on the rise

Network World

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.

Android malware that can infiltrate corporate networks is spreading

Network World

An Android malware is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. DressCode, a family of Android malware, has been found circulating in at least 3,000 Trojanized apps, security firm Trend Micro said on Friday. To read this article in full or to leave a comment, please click here

How to Protect Your PC from Viruses and Malware

Galido

Information Technology Blog - - How to Protect Your PC from Viruses and Malware - Information Technology Blog. Knowing the fact malware threat is not limited to any user base or country, as it is looming large and causing serious data security threat, it becomes important to apply preventive measures. In this article, we have discussed a few simple yet most effective ways to protect your PC from viruses and malware. Use Best Malware Protection Software.

Cisco, Fortinet issue patches against NSA malware

Network World

Customers of certain Cisco and Fortinet security gear need to patch exploits made public this week after a purported hack of NSA malware. To read this article in full or to leave a comment, please click hereBoth companies have issued fixes to address exploits that were posted online and after they found the exploits represent real threats to some of their products, including versions of Cisco’s popular PIX and ASA firewalls and versions of Fortinet’s signature Fortigate firewalls.

Malware Museum’s 10 greatest hits

Network World

Big hits Since the malware museum opened its virtual doors in February, its collection of de-fanged DOS-based malware from the 80s and 90s has attracted nearly 1 million views. Here are the museum’s most downloaded viruses: To read this article in full or to leave a comment, please click hereRead the full story.)

Kindle Flaw Could Have Let Hackers Take Control of Your Ebook Reader and Steal Information

GizModo VR

kindle ebook yaniv balmas cybercrime malware articles e books e reader amazon information and communications technology new media computing technology internet computer security electronic publishing

eBook 105

Europol Captures 12 Suspects Believed to Have Used Ransomware to Attack 1,800 Victims in 71 Countries

GizModo VR

europol ransomware phishing agencies of the european union malware law enforcement in europe articles cybercrime security breaches crime security norsk hydro eurojustThe fight against ransomware attacks continues, this time on the other side of the Atlantic.

DDoS attack from Mirai malware 'killing business' in Liberia

Network World

The malware behind last month's massive internet disruption in the U.S. This week, a botnet powered by the Mirai malware has been launching distributed denial-of-service (DDoS) attacks on IP addresses in the African country, according to security researchers. To read this article in full or to leave a comment, please click hereis targeting Liberia with financially devastating results.

How to get rid of malware on your iPad

TechnoBezz

However, this does not make your iPad completely foolproof to malware and your device may still be susceptible to various other problems. This article will take you through the steps to tackle such issues. The moment you notice your device acting unusual is when you suspect malware.

The essential guide to anti-malware tools

Network World

It's a sad fact of life in IT nowadays that some form of preparation for dealing with malware is part and parcel of what systems and network administrators must do. This goes above and beyond normal due diligence in warding off malware. It includes a proper appreciation of the work and risks involved in handling malware infections, and acquiring a toolkit of repair and cleanup tools to complement protective measures involved in exercising due diligence.

Hackers sell tool to spread malware through torrent files

Network World

A new tool on the black market is helping hackers distribute malware through torrent files in exchange for a fee. It leverages torrenting -- a popular file-sharing method associated with piracy -- to spread the malware. To read this article in full or to leave a comment, please click hereBe careful with what you torrent. On Tuesday, security researchers at InfoArmor said they discovered the so-called "RAUM" tool in underground forums.

Crash Override: Malware that took down a power grid may have been a test run

Network World

Two security firms have released reports about the malware which was used in the December 2016 Ukraine power outage, warning that the partial power outage in Kiev may have been test run; the malware could be leveraged against other countries, including the US. The malware, dubbed Crash Override in the Dragos report ( pdf ) and Industroyer in the ESET report ( pdf ), has nothing to do with espionage and everything to do with cyber-sabotage.

IoT malware starts showing destructive behavior

Network World

Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices. Researchers from Palo Alto Networks found a new malware program dubbed Amnesia that infects digital video recorders through a year-old vulnerability. To read this article in full or to leave a comment, please click here

Stealthy cyberespionage malware targets energy companies

Network World

Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies. The malware program, which researchers from security firm SentinelOne have dubbed Furtim’s Parent, is a so-called dropper -- a program designed to download and install additional malware components and tools. The goal of droppers is to prepare the field for the installation of other malware components that can perform specialized tasks.

Mac malware is found targeting biomedical research

Network World

A Mac malware that’s been spying on biomedical research centers may have been circulating undetected for years, according to new research. The malware, which Apple calls Fruitfly, is designed to take screen captures, access the Mac’s webcam, and simulate mouse clicks and key presses, allowing for remote control by a hacker, Malwarebytes said in a blog post on Wednesday. The security firm said that neither it nor Apple have identified how the malware has been spreading.

Malware Museum causes controversy among security pros

Network World

The latter work (COFFSHOP.COM, artist unknown, if you’re keeping score) can be found at the Malware Museum, the brainchild of F-Secure Chief Research Officer Mikko Hypponen. Visitors can watch malware’s on-screen manifestations at the website and can even download emulations to their PCs. To read this article in full or to leave a comment, please click hereAh, the edifying trip to the museum. Basking in the Dutch masters. Pondering Warhol’s soup cans.

Malware distributors are switching to less suspicious file types

Network World

After aggressively using JavaScript email attachments to distribute malware for the past year, attackers are now switching to less suspicious file types to trick users. Last week, researchers from the Microsoft Malware Protection Center warned about a new wave of spam emails that carried malicious.LNK files inside ZIP archives. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.

Danes targeted by malware spread through Dropbox

Network World

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack. To read this article in full or to leave a comment, please click hereAccording to a research report by AppRiver , the attack hit Denmark, Germany, and several surrounding Scandinavian countries on Wednesday morning. The attack was unusual in that it narrowly targeted a specific audience, said Troy Gill, security analyst at AppRiver.

IDG Contributor Network: Major cloud is infested with malware, researchers say

Network World

Cloud repositories are actively supplying malware, according to computer experts. It’s “challenging to find,” Georgia Tech writes in an article on its website. The problem being that the resulting malware is quick to “assemble from stored components that individually may not appear to be malicious.” To read this article in full or to leave a comment, please click hereAnd problematically, it’s insidious and hard to find.

New Windows code injection method could let malware bypass detection

Network World

Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems. To read this article in full or to leave a comment, please click hereThe new method was devised by researchers from security firm Ensilo who dubbed it AtomBombing because it relies on the Windows atom tables mechanism.

This malware attack starts with a fake customer-service call

Network World

A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. On Monday, security firm Trustwave said that three of its clients in the past month had encountered malware built with coding found in previous Carbanak attacks. To read this article in full or to leave a comment, please click hereHotel and restaurant chains, beware.

Stealthy Mac malware spies on encrypted browser traffic

Network World

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information. The malware was attached to the email as a file called Dokument.zip. To read this article in full or to leave a comment, please click hereThe new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.

Before Going Underground, Hackers Behind the Colonial Attack Cleared $90 Million in Bitcoin

GizModo VR

bitcoin business finance tom robinson articles darkside blockchain cryptography ransomware cryptocurrencies cybercrime security breaches elliptic malware technology decentralization

Old Windows malware may have tampered with 132 Android apps

Network World

The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks. To read this article in full or to leave a comment, please click hereMore than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers.

New IoT malware targets 100,000 IP cameras via known flaw

Network World

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products. The malware, called Persirai, has been found infecting Chinese-made wireless cameras since last month, security firm Trend Micro said on Tuesday. The malware does so by exploiting flaws in the cameras that a security researcher reported back in March.

Microsoft's anti-malware program still isn't very good

Network World

In spite of a recent effort to improve the performance and detection rates in Windows Defender, Microsoft's anti-malware tool is still not very good at its job. The latest round of tests performed by German institute AV-TEST, one of the most respected and regarded malware testing shops, show that Microsoft Security Essentials and Windows Malicious Software Removal Tool fared the poorest in removing an existing infection.

Saudi Arabia again hit with disk-wiping malware Shamoon 2

Network World

The disk-wiping Shamoon malware, which was used in attacks that destroyed data on 35,000 computers at Saudi Aramco in 2012, is back; the Shamoon variant prompted Saudi Arabia to issue a warning on Monday. To read this article in full or to leave a comment, please click hereAn alert from the telecoms authority, seen by Reuters, warned all organizations to be on the lookout for the variant Shamoon 2.

Ask.com serves as a conduit for malware - again

Network World

In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates. To read this article in full or to leave a comment, please click here

Cyberspies tap free tools to make powerful malware framework

Network World

Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework stitched together from JavaScript code and publicly available tools. The attack, analyzed by researchers from antivirus firm Bitdefender , shows that cyberespionage groups don't necessarily need to invest a lot of money in developing unique and powerful malware programs to achieve their goals.

This malware pretends to be WhatsApp, Uber and Google Play

Network World

Hackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play. The malware, which has struck Android users in Denmark, Italy and Germany, has been spreading through a phishing campaign over SMS (short message service), security vendor FireEye said on Tuesday. Once downloaded, the malware will create fake user interfaces on the phone as an “overlay” on top of real apps.

Spotify ads slipped malware onto PCs and Macs

Network World

Spotify's ads crossed from nuisance over to outright nasty this week, after the music service’s advertising started serving up malware to users on Wednesday. The malware was able to automatically launch browser tabs on Windows and Mac PCs, according to complaints that surfaced online. As is typical for this kind of malware, the ads directed users’ browsers to other malware-containing sites in the hopes that someone would be duped into downloading more malicious software.

Open-source developers targeted in sophisticated malware attack

Network World

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie. To read this article in full or to leave a comment, please click here

Check your BITS, because deleting malware might not be enough

Network World

Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've been already cleaned by antivirus products. The technique was observed in the wild last month by researchers from SecureWorks while responding to a malware incident for a customer. The two malicious jobs periodically downloaded and attempted to reinstall the deleted malware. To read this article in full or to leave a comment, please click here

Crafty malware is found targeting U.S. government employees

Network World

A tough-to-detect malware that attacks government and corporate computers has been upgraded, making it more aggressive in its mission to steal sensitive files, according to security firm InfoArmor. Last November, InfoArmor published details on GovRAT, a sophisticated piece of malware that’s designed to bypass antivirus tools. Through GovRAT, hackers can potentially steal files from a victim’s computer, remotely execute commands, or upload other malware to the system.

Mac malware, possibly made in Iran, targets US defense industry

Network World

That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian hackers to target the U.S. The malware, called MacDownloader, was found on a website impersonating the U.S. The fake site was previously used in a spear phishing email attack to spread Windows malware and is believed to be maintained by Iranian hackers, the researchers claimed. To read this article in full or to leave a comment, please click here

Shodan search engine starts unmasking malware command-and-control servers

Network World

There's now a new tool that could allow companies to quickly block communications between malware programs and their frequently changing command-and-control servers. Threat intelligence company Recorded Future has partnered with Shodan, a search engine for internet-connected devices and services, to create a new online crawler called Malware Hunter. To read this article in full or to leave a comment, please click here