malware

SecuritySophos

Nur Vorkasse bitte – Neue WannaCrypt-Ransomware ist aufdringlich

Credit to Author: Jörg Schindler| Date: Tue, 26 Jun 2018 10:24:35 +0000

Gibt es Schlimmeres als einen Ransomware-Angriff, der sämtliche Dateien zerhackt und Geld fordert, damit der Computer wieder befreit wird? WannaCry hat der Ransomware-Gefahr eine ganz neue Dimension verliehen, indem es den Prozess der Datenzerstörung mit einem selbst-verbreitenden Computer-Virus kombinierte. Als Ergebnis konnte WannaCry sich automatisch ins eigene Netzwerk einschleichen und hatte das Potenzial, Hunderte oder [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QLhkSXxyFmU” height=”1″ width=”1″ alt=””/>

Read More
MalwareBytesSecurity

A week in security (August 27 – September 2)

Credit to Author: Malwarebytes Labs| Date: Mon, 03 Sep 2018 15:00:36 +0000

A round-up of the security news from August 27 – September 2, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 27 – September 2) appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

“Troldesh’s” One More Variant in the Encryption Offender

Credit to Author: Gulamgaus Shaikh| Date: Mon, 03 Sep 2018 11:52:13 +0000

Over the past few days, we have been observing criminals/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds the extension as “.no_more_ransom”. This ransomware comes under Crypto-Ransomware variant, the origin of this…

Read More
QuickHealSecurity

I am invisible – Monero (XMR) Miner

Credit to Author: Ghanshyam More| Date: Mon, 03 Sep 2018 10:27:58 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many…

Read More
MalwareBytesSecurity

Reversing malware in a custom format: Hidden Bee elements

Credit to Author: hasherezade| Date: Thu, 30 Aug 2018 15:41:34 +0000

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis for a closer look.

Categories:

Tags:

(Read more…)

The post Reversing malware in a custom format: Hidden Bee elements appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Fileless malware: getting the lowdown on this insidious threat

Credit to Author: Vasilios Hioureas| Date: Wed, 29 Aug 2018 16:48:35 +0000

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Categories:

Tags:

(Read more…)

The post Fileless malware: getting the lowdown on this insidious threat appeared first on Malwarebytes Labs.

Read More