Lemon_Duck PowerShell malware cryptojacks enterprise networks

Credit to Author: rajeshnataraj| Date: Tue, 01 Oct 2019 04:01:09 +0000

SophosLabs are monitoring a significant spike in crypto mining attacks, which spread quickly across enterprise networks. Starting from a single infection, these attacks use a variety of malicious scripts that, eventually, turn an enterprise&#8217;s large pool of CPU resources into efficient cryptocurrency mining slaves. The threat actors behind these campaigns have been using an array [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jF91Bgk0dso” height=”1″ width=”1″ alt=””/>

Read more

Sophisticated threats plague ailing healthcare industry

Credit to Author: Jovi Umawing| Date: Tue, 30 Apr 2019 15:00:00 +0000

Black hat hackers are after patient healthcare data, and such breaches will only intensify. Which forms of malware are behind the attacks? We take a look at the advanced threats targeting a sector struggling to keep up.

Categories:

Tags:

(Read more…)

The post Sophisticated threats plague ailing healthcare industry appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Medical Malware and Monitor Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 18 Apr 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how baby monitors may be susceptible to hacking. Also, learn about a medical flaw that enables hackers to hide malware. Read on: Is Your Baby Monitor…

The post This Week in Security News: Medical Malware and Monitor Hacks appeared first on .

Read more

Emotet revisited: pervasive threat still a danger to businesses

Credit to Author: Pieter Arntz| Date: Thu, 14 Mar 2019 15:00:00 +0000

Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Categories:

Tags:

(Read more…)

The post Emotet revisited: pervasive threat still a danger to businesses appeared first on Malwarebytes Labs.

Read more

Sophisticated Ransomware : “Katyusha”

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 10:59:58 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not…

Read more

How threat actors are using SMB vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 14 Dec 2018 16:00:00 +0000

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.

Read more