Tax refund phish logs keystrokes to swipe personal details

Categories: News

Tags: tax refund

Tags: phish

Tags: phishing

Tags: scam

Tags: greece

Tags: greek

Tags: javascript

Tags: keylogger

The phishing mails rely on that time-honoured tradition of bogus tax returns and non-existent refunds.

(Read more…)

The post Tax refund phish logs keystrokes to swipe personal details appeared first on Malwarebytes Labs.

Read more

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read more

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Credit to Author: Pradeep Kulkarni| Date: Thu, 01 Nov 2018 06:17:45 +0000

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering…

Read more

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

Credit to Author: Gajanan Khond| Date: Fri, 17 Aug 2018 14:12:09 +0000

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The…

Read more

A Look at Scan4You and the Counter Antivirus Service Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…

The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .

Read more

Information stolen? What now?

Credit to Author: Pieter Arntz| Date: Thu, 18 May 2017 15:00:51 +0000

Identifying and removing the malware is our job, but what do you need to do yourself, to control the aftermath of malware that steals interesting information from an infected computer?



(Read more…)

The post Information stolen? What now? appeared first on Malwarebytes Labs.

Read more