Emotet 101, stage 1: The spam lure

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:55:43 +0000

By SophosLabs Research Emotet operates on a mass scale. Everything it does, it does in bulk. A typical infection begins when the victim receives a specially crafted spam email. Emotet&#8217;s creators send these out by the thousands and, in some cases, the bots themselves send more. The lures employ mass-created malicious document files. The payload [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/7i2oOO4OT8A” height=”1″ width=”1″ alt=””/>

Read more

New Golang brute forcer discovered amid rise in e-commerce attacks

Credit to Author: Jérôme Segura| Date: Tue, 26 Feb 2019 16:00:08 +0000

E-commerce sites are a hot commodity these days. We dig into how compromised PCs are helping to hack into them to inject skimmers, whether via vulnerabilities in the websites themselves or through a new malware we discovered gaining entry via brute force.

Categories:

Tags:

(Read more…)

The post New Golang brute forcer discovered amid rise in e-commerce attacks appeared first on Malwarebytes Labs.

Read more

GandCrab Riding Emotet’s Bus!

Credit to Author: Bajrang Mane| Date: Fri, 15 Feb 2019 10:03:57 +0000

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes frequently in intervals with different techniques and variants to deliver malware…

Read more

Avzhan DDoS bot dropped by Chinese drive-by attack

Credit to Author: hasherezade| Date: Fri, 23 Feb 2018 18:00:00 +0000

The Avzhan DDoS bot is back in the wild again, this time being dropped by a Chinese drive-by attack. In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past.

Categories:

Tags:

(Read more…)

The post Avzhan DDoS bot dropped by Chinese drive-by attack appeared first on Malwarebytes Labs.

Read more

Drive-by cryptomining campaign targets millions of Android users

Credit to Author: Jérôme Segura| Date: Mon, 12 Feb 2018 14:00:24 +0000

Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.

Categories:

Tags:

(Read more…)

The post Drive-by cryptomining campaign targets millions of Android users appeared first on Malwarebytes Labs.

Read more

Microsoft teams up with law enforcement and other partners to disrupt Gamarue (Andromeda)

Credit to Author: Windows Defender ATP| Date: Mon, 04 Dec 2017 23:06:44 +0000

Today, with help from Microsoft security researchers, law enforcement agencies around the globe, in cooperation with Microsoft Digital Crimes Unit (DCU), announced the disruption of Gamarue, a widely distributed malware that has been used in networks of infected computers collectively called the Andromeda botnet. The disruption is the culmination of a journey that started in

Read more

Read more

More trouble in Google Play land

Credit to Author: Malwarebytes Labs| Date: Fri, 20 Oct 2017 20:41:36 +0000

After our mobile security experts repeatedly discovered adware on several apps on the Google Play store, our friends at Symantec have unearthed at least eight malicious apps that are found capable of adding affected mobile devices to a botnet.

Categories:

Tags:

(Read more…)

The post More trouble in Google Play land appeared first on Malwarebytes Labs.

Read more

Botnets – the malware that makes you part of the problem [PODCAST]

Credit to Author: Paul Ducklin| Date: Fri, 23 Jun 2017 10:30:12 +0000

Learn from Fraser Howard, one of the world’s leading anti-malware researchers, how to dezombify your world.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=40249&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/eDoXCrv4BPE” height=”1″ width=”1″ alt=””/>

Read more