The life and death of the ZeuS Trojan

Credit to Author: Malwarebytes Labs| Date: Wed, 21 Jul 2021 17:15:39 +0000

ZeuS is an infamous banking Trojan that infected millions of systems, and stole billions of dollars.

Categories: 101

Tags:

(Read more…)

The post The life and death of the ZeuS Trojan appeared first on Malwarebytes Labs.

Read more

Nope, that isn’t Elon Musk, and he isn’t offering a free Topmist Dust watch either

Credit to Author: Malwarebytes Labs| Date: Mon, 12 Jul 2021 13:50:05 +0000

We take a look at a peculiar batch of spam on social media, claiming to show Elon Musk recommending we go searching for watch brands.

Categories: Social engineering

Tags:

(Read more…)

The post Nope, that isn’t Elon Musk, and he isn’t offering a free Topmist Dust watch either appeared first on Malwarebytes Labs.

Read more

Fired by algorithm: The future’s here and it’s a robot wearing a white collar

Credit to Author: Pieter Arntz| Date: Tue, 29 Jun 2021 15:28:58 +0000

A Bloomberg investigation has revealed that Amazon Flex drivers are being evaluated, and in some cases fired, by algorithms.

Categories: Reports

Tags:

(Read more…)

The post Fired by algorithm: The future’s here and it’s a robot wearing a white collar appeared first on Malwarebytes Labs.

Read more

A deep dive into Saint Bot, a new downloader

Credit to Author: Threat Intelligence Team| Date: Tue, 06 Apr 2021 21:37:12 +0000

Saint Bot is a downloader that has been used to drop stealers. We take a deep look at it and its accompanying panel.

Categories: CriminalsThreat analysis

Tags:

(Read more…)

The post A deep dive into Saint Bot, a new downloader appeared first on Malwarebytes Labs.

Read more

GandCrab 101: All about the most widely distributed ransomware of the moment

Credit to Author: Luca Nagy| Date: Tue, 05 Mar 2019 14:00:10 +0000

In this Sophos101 report, we’ll give you the lowdown on what you need to know about this, unfortunately, widely disseminated malware.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QbQ2o1iJn68″ height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 5: a delivery vehicle for more malware

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:59:17 +0000

By SophosLabs Research Emotet is a botnet in its own right, one so prolific and dominant that the United States CERT, the body tasked with tracking cyberthreats to the country, named Emotet in July, 2018 &#8220;among the most costly and destructive malware&#8221; to affect governments, enterprises and organizations large and small, and individual computer users. [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/A9JdHdI4I94″ height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 4: command and control

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:58:33 +0000

By SophosLabs Research The Emotet family could not do what it does without receiving a constant stream of instructions from its owners, or in the absence of the detailed level of feedback about its operating environment each bot sends home from an infected host machine. It also uses huge numbers of compromised websites that belong [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/tuvtIYBP4JI” height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 3: The Emotet executable

Credit to Author: hajnalkakope| Date: Tue, 05 Mar 2019 13:57:54 +0000

By SophosLabs Research Emotet&#8217;s arrival is usually preceded by a deceptive spam email, which has a malicious attachment. Opening the attachment starts a process which can lead to an Emotet infection. The Emotet application is an evolved binary, in the sense that it has gone through thousands of iterations over its existence. Its presence as [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/CfniXxu0bac” height=”1″ width=”1″ alt=””/>

Read more