malware

  • Blog

    5 Problems on Your Computer That Might be Caused by Malware

    Malware is the scary boogeyman of computers, supposedly capable of destroying everything you know and love. But what does it actually look like? How can you tell when your computer is infected? If your computer has any of the following problems, that could be a dead giveaway. 1 Your Browser is Forcefully Redirected Without Warning Forceful redirects are a huge…

    Read More »
  • Blog

    Botnet exploits GeoVision zero-day to install Mirai malware

    A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks. The flaw is tracked as CVE-2024-11120 and was discovered by Piort Kijewski of The Shadowserver Foundation. It is a critical severity (CVSS v3.1 score: 9.8) OS command injection problem, allowing unauthenticated attackers to execute arbitrary system commands…

    Read More »
  • Blog

    Unpatched Mazda Connect bugs let hackers install persistent malware

    Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with root permission. The security issues remain unpatched and some of them are command injection flaws that could be leveraged to obtain unrestricted access to vehicle networks, potentially impacting the car’s operation and safety. Vulnerability details…

    Read More »
  • Blog

    North Korean hackers use new macOS malware against crypto firms

    North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. Researchers are calling the campaign Hidden Risk and say that it lures victims with emails that share fake news about the latest activity in the cryptocurrency sector. The malware deployed in these attacks relies on a novel persistence mechanism on macOS that…

    Read More »
  • Blog

    New SteelFox malware hijacks Windows PCs using vulnerable driver

    A new malicious package called ‘SteelFox’ mines for cryptocurrency and steals credit card data by using the “bring your own vulnerable driver” technique to get SYSTEM privileges on Windows machines. The malware bundle dropper is distributed through forums and torrent trackers as a crack tool that activates legitimate versions of various software like Foxit PDF Editor, JetBrains and AutoCAD. Using a vulnerable driver…

    Read More »
  • Blog

    Two notorious infostealer malware operations were just knocked offline

    A joint operation of global law enforcement agencies has dismantled the operations of two prominent strains of infostealer malware. Operation Magnus, was a collaboration between Dutch National Police, the FBI, and agencies from Australia, Belgium, Portugal, and the UK, targeting the infrastructure underpinning the RedLine and Meta infostealers. RedLine and Meta steal data including login credentials, as well as addresses,…

    Read More »
  • Blog

    Russian charged by U.S. for creating RedLine infostealer malware

    The United States announced charges today against Maxim Rudometov, a Russian national, for being the suspected developer and administrator of the RedLine malware operation, one of the most prolific infostealers over the past few years. These infostealers, marketed to cybercriminals and sold via subscriptions, enable attackers to steal credentials and financial data and bypass multi-factor authentication. Rudometov was named in…

    Read More »
  • Blog

    Russia targets Ukrainian conscripts with Windows, Android malware

    A hybrid espionage/influence campaign conducted by the Russian threat group ‘UNC5812’ has been uncovered, targeting Ukrainian military recruits with Windows and Android malware. According to Google’s threat intelligence, the campaign impersonated a “Civil Defense” persona along with a website and dedicated Telegram channel to distribute malware through a fake recruitment avoidance app dubbed “Sunspinner” by the researchers. The campaign targets…

    Read More »
  • Blog

    Bumblebee malware returns after recent law enforcement disruption

    The Bumblebee malware loader has been spotted in new attacks recently, more than four months after Europol disrupted it during ‘Operation Endgame’ in May. Believed to be the creation of TrickBot developers, the malware emerged in 2022 as a replacement for the BazarLoader backdoor to provide ransomware threat actors access to victim networks. Bumblebee typically achieves infection via phishing, malvertising, and SEO…

    Read More »
  • Blog

    Fake Google Meet conference errors push infostealing malware

    A new ClickFix campaign is luring users to fraudulent Google Meet conference pages showing fake connectivity errors that deliver info-stealing malware for Windows and macOS operating systems. ClickFix is a social-engineering tactic that emerged in May, first reported by cybersecurity company Proofpoint, from a threat actor (TA571) that used messages impersonating errors for Google Chrome, Microsoft Word, and OneDrive. The errors prompted…

    Read More »
Back to top button
close