Credit to Author: Tejaswini Sandapolla| Date: Tue, 18 Oct 2022 06:45:52 +0000

Emotet is usually delivered by SPAM campaigns containing document files. This self-propagating Trojan is a downloader malware that…

The post A DEEP DIVE INTO NEW 64 BIT EMOTET MODULES appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

A week in security (June 6 – June 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Jun 2022 10:29:57 +0000

The most important and interesting computer security stories from the last week.

The post A week in security (June 6 – June 12) appeared first on Malwarebytes Labs.

Read more

Conti’s Ransomware Toll on the Healthcare Industry

Credit to Author: BrianKrebs| Date: Mon, 18 Apr 2022 20:41:08 +0000

Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other healthcare facilities since first surfacing in 2018 under the name “Ryuk.”

Read more

Conti Ransomware Group Diaries, Part II: The Office

Credit to Author: BrianKrebs| Date: Wed, 02 Mar 2022 17:49:52 +0000

Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves.

Read more

Zyxel Fixes 0day in Network Storage Devices

Credit to Author: BrianKrebs| Date: Mon, 24 Feb 2020 17:13:11 +0000

Networking hardware vendor Zyxel today released an update to fix a critical flaw in many of its network attached storage (NAS) devices that can be used to remotely commandeer them. The patch comes 12 days after KrebsOnSecurity alerted the company that precise instructions for exploiting the vulnerability were being sold for $20,000 in the cybercrime underground. Based in Taiwan, Zyxel Communications Corp. (a.k.a “ZyXEL”) is a maker of networking devices, including Wi-Fi routers, NAS products and hardware firewalls. The company has roughly 1,500 employees and boasts some 100 million devices deployed worldwide. While in many respects the class of vulnerability addressed in this story is depressingly common among Internet of Things (IoT) devices, the flaw is notable because it has attracted the interest of groups specializing in deploying ransomware at scale.

Read more