Month: February 2018

QuickHealSecurity

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

Credit to Author: Pradeep Kulkarni| Date: Sat, 03 Feb 2018 09:39:38 +0000

The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSA18-01 on February 2, 2018 to address this issue. According to Adobe the in wild attack is targeted and it impacts limited windows users….

Read More
MalwareBytesSecurity

New Mac cryptominer distributed via a MacUpdate hack

Credit to Author: Thomas Reed| Date: Fri, 02 Feb 2018 21:20:01 +0000

A new Mac cryptocurrency miner, called OSX.CreativeUpdate, was being distributed from the MacUpdate website, in the guise of known apps such as Firefox.

Categories:

Tags:

(Read more…)

The post New Mac cryptominer distributed via a MacUpdate hack appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated)

Credit to Author: Malwarebytes Labs| Date: Tue, 30 Jan 2018 23:43:52 +0000

Ransomware may have slowed its growth but is still a go-to payload for threat actors looking to monetize drive-by download attacks. The latest attempt: GandCrab ransomware.

Categories:

Tags:

(Read more…)

The post GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated) appeared first on Malwarebytes Labs.

Read More
FortinetSecurity

Satori Adds Known Exploit Chain to Enslave Wireless IP Cameras

Credit to Author: David Maciejak, Jasper Manuel and Rommel Joven| Date: Fri, 02 Feb 2018 20:34:59 +0000

Satori, a Mirai based IoT bot, has been one of the most actively updated exploits in recent months. It is believed that the hacker behind this bot is also the author of other Mirai variants, known as Okiru, and Masuta. FortiGuard Labs researchers recently observed a new Satori version that had added a known exploit chain (one which had been used in the past by the Persirai bot) to enable it to spread to vulnerable devices, particularly, wireless IP cameras that run a vulnerable custom version of the GoAhead web server.

Read More