Security

QuickHealSecurity

I am invisible – Monero (XMR) Miner

Credit to Author: Ghanshyam More| Date: Mon, 03 Sep 2018 10:27:58 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many…

Read More
SecurityTrendMicro

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Air Canada and Cryptojacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 31 Aug 2018 14:33:05 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Air Canada reported a data breach that exposed passport details for more than 20,000 customers on their mobile app. Also, Trend Micro’s Midyear Security Roundup reported an…

The post This Week in Security News: Air Canada and Cryptojacking appeared first on .

Read More
MalwareBytesSecurity

Reversing malware in a custom format: Hidden Bee elements

Credit to Author: hasherezade| Date: Thu, 30 Aug 2018 15:41:34 +0000

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis for a closer look.

Categories:

Tags:

(Read more…)

The post Reversing malware in a custom format: Hidden Bee elements appeared first on Malwarebytes Labs.

Read More