malware

  • Blog

    Microsoft Trusted Signing service abused to code-sign malware

    Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Threat actors have long sought after code-signing certificates as they can be used to sign malware to appear like they are from a legitimate company. Signed malware also has the advantage of potentially bypassing security filters that would normally block unsigned executables, or at least treat…

    Read More »
  • Blog

    FBI warnings are true—fake file converters do push malware

    The FBI is warning that fake online document converters are being used to steal peoples’ information and, in worst-case scenarios, to deploy ransomware on victims’ devices. The warning came last week from the FBI Denver field office, after receiving an increasing number of reports about these types of tools. “The FBI Denver Field Office is warning that agents are increasingly…

    Read More »
  • Blog

    Steam pulls game demo infecting Windows with info-stealing malware

    Valve has removed from its Steam store the game title ‘Sniper: Phantom’s Resolution’ following multiple users reporting that the demo installer infected their systems with information stealing malware. The game, published under the developer name ‘Sierra Six Studios,’ was supposed to be an early preview of the title with a release planned in the coming months. Before the title was pulled…

    Read More »
  • Blog

    Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware

    Threat actors are exploiting users’ familiarity with verification tests to trick them into loading malware onto their systems, new research has warned. A report from HP Wolf Security highlighted multiple threat campaigns where hackers took advantage of the fact users are forced to jump through a growing number of hoops to prove they are a legitimate user. The report describes…

    Read More »
  • Blog

    Microsoft Trust Signing service abused to code-sign malware

    Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Threat actors have long sought after code-signing certificates as they can be used to sign malware to appear like they are from a legitimate company. Signed malware also has the advantage of potentially bypassing security filters that would normally block unsigned executables, or at least treat…

    Read More »
  • Blog

    Beware the coming Mac malware season – Computerworld

    Jaron Bradley, director of Jamf Threat Labs, explained how Mac users should approach this new attack vector. “Users should never enter their iCloud credentials outside of the official Apple website. They should also be cautious when encountering flashing warnings that prompt them to call a phone number to resolve a supposed threat. These calls often lead to scammers who promise to…

    Read More »
  • Blog

    FBI ‘Increasingly Seeing’ Malware Distributed In Document Converters

    Image: iStockphoto/domoyega Threat actors may attempt to distribute malware, including ransomware, by offering free document converters, according to a March 7 report from the FBI’s Denver office. “Agents are increasingly seeing” this type of scam. The scheme has been deployed globally, the FBI warned. How the document conversion scam works Threat actors behind the document converter scam disguise malicious software…

    Read More »
  • Blog

    Malware campaign ‘DollyWay’ breached 20,000 WordPress sites

    A malware operation dubbed ‘DollyWay’ has been underway since 2016, compromising over 20,000 WordPress sites globally to redirect users to malicious sites. The campaign has evolved significantly in the past eight years, leveraging advanced evasion, re-infection, and monetization strategies. According to GoDaddy researcher Denis Sinegubko, DollyWay has been functioning as a large-scale scam redirection system in its latest version (v3). However, in…

    Read More »
  • Blog

    New RAT malware used for crypto theft, reconnaissance

    ​Microsoft has discovered a new remote access trojan (RAT) that employs “sophisticated techniques” to avoid detection, maintain persistence, and extract sensitive data. While the malware (dubbed StilachiRAT) hasn’t yet reached widespread distribution, Microsoft says it decided to publicly share indicators of compromise and mitigation guidance to help network defenders detect this threat and reduce its impact. Due to the limited…

    Read More »
  • Blog

    FBI issues warning over free online file converters that infect your PC with malware

    Regardless of how tech savvy you may be, chances are you’ve likely turned to a free online file converter for help with quickly changing a file from one type to another. However, you may want to think twice before doing so, as the FBI is now warning that hackers are using these free tools to spread dangerous malware to vulnerable…

    Read More »
Back to top button
close