Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

Credit to Author: Gajanan Khond| Date: Fri, 17 Aug 2018 14:12:09 +0000

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The…

Read more

A week in security (August 6 – August 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000

A round-up of the security news from August 6 – August 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 6 – August 12) appeared first on Malwarebytes Labs.

Read more

A week in security (August 6 – 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Aug 2018 16:37:10 +0000

A round-up of the security news from August 6 – 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Categories:

Tags:

(Read more…)

The post A week in security (August 6 – 12) appeared first on Malwarebytes Labs.

Read more

How to protect your RDP access from ransomware attacks

Credit to Author: Pieter Arntz| Date: Fri, 10 Aug 2018 16:13:18 +0000

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?

Categories:

Tags:

(Read more…)

The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs.

Read more

Again! A New .NET Ransomware Shrug2

Credit to Author: Ghanshyam More| Date: Fri, 10 Aug 2018 09:35:21 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build and obfuscate malware in .NET framework rather than making them in…

Read more

Social engineering attacks: What makes you susceptible?

Credit to Author: Jovi Umawing| Date: Thu, 02 Aug 2018 15:00:00 +0000

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Categories:

Tags:

(Read more…)

The post Social engineering attacks: What makes you susceptible? appeared first on Malwarebytes Labs.

Read more

Which specific malware trends should American businesses be prepared for?

Credit to Author: Trend Micro| Date: Fri, 27 Jul 2018 15:30:02 +0000

In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and data. After all, with each new day comes a sophisticated…

The post Which specific malware trends should American businesses be prepared for? appeared first on .

Read more

A week in security (July 16 – July 22)

Credit to Author: Malwarebytes Labs| Date: Mon, 23 Jul 2018 17:30:01 +0000

A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 16 – July 22) appeared first on Malwarebytes Labs.

Read more

Cybercrime tactics & techniques Q2 2018

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 12:05:00 +0000

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Categories:

Tags:

(Read more…)

The post Cybercrime tactics & techniques Q2 2018 appeared first on Malwarebytes Labs.

Read more