keylogger

QuickHealSecurity

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read More
QuickHealSecurity

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Credit to Author: Pradeep Kulkarni| Date: Thu, 01 Nov 2018 06:17:45 +0000

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering…

Read More
QuickHealSecurity

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

Credit to Author: Gajanan Khond| Date: Fri, 17 Aug 2018 14:12:09 +0000

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The…

Read More
SecurityTrendMicro

A Look at Scan4You and the Counter Antivirus Service Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…

The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .

Read More
MalwareBytesSecurity

Information stolen? What now?

Credit to Author: Pieter Arntz| Date: Thu, 18 May 2017 15:00:51 +0000

Identifying and removing the malware is our job, but what do you need to do yourself, to control the aftermath of malware that steals interesting information from an infected computer?

Categories:

Tags:

(Read more…)

The post Information stolen? What now? appeared first on Malwarebytes Labs.

Read More