New version of IcedID Trojan uses steganographic payloads

Credit to Author: Threat Intelligence Team| Date: Tue, 03 Dec 2019 18:06:13 +0000

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Categories:

Tags:

(Read more…)

The post New version of IcedID Trojan uses steganographic payloads appeared first on Malwarebytes Labs.

Read more

Emotet is back: botnet springs back to life with new spam campaign

Credit to Author: Threat Intelligence Team| Date: Mon, 16 Sep 2019 17:04:53 +0000

After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.

Categories:

Tags:

(Read more…)

The post Emotet is back: botnet springs back to life with new spam campaign appeared first on Malwarebytes Labs.

Read more

Chalubo botnet wants to DDoS from your server or IoT device

Credit to Author: Tim Easton| Date: Mon, 22 Oct 2018 22:01:38 +0000

Attackers using brute-force SSH attacks have started to distribute a new bot that engages in coordinated denial-of-service attacks<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/gH8Nr4BLEcA” height=”1″ width=”1″ alt=””/>

Read more

Malicious doc “builders” abandon old exploits wholesale

Credit to Author: Gabor Szappanos| Date: Tue, 11 Sep 2018 16:15:26 +0000

A key piece of the malware ecosystem adopts new vulnerabilities, and scraps old exploits, in record time<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/gKMCGkmvrcQ” height=”1″ width=”1″ alt=””/>

Read more

Trojans: What’s the real deal?

Credit to Author: Christopher Boyd| Date: Wed, 25 Jul 2018 15:40:47 +0000

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Categories:

Tags:

(Read more…)

The post Trojans: What’s the real deal? appeared first on Malwarebytes Labs.

Read more

Malware analysis: decoding Emotet, part 2

Credit to Author: Vishal Thakur| Date: Thu, 07 Jun 2018 15:00:00 +0000

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!

Categories:

Tags:

(Read more…)

The post Malware analysis: decoding Emotet, part 2 appeared first on Malwarebytes Labs.

Read more