The life and death of the ZeuS Trojan

Credit to Author: Malwarebytes Labs| Date: Wed, 21 Jul 2021 17:15:39 +0000

ZeuS is an infamous banking Trojan that infected millions of systems, and stole billions of dollars.

Categories: 101

Tags:

(Read more…)

The post The life and death of the ZeuS Trojan appeared first on Malwarebytes Labs.

Read more

Coronavirus scams, found and explained

Credit to Author: David Ruiz| Date: Fri, 20 Mar 2020 15:00:00 +0000

Here are some of the many coronavirus email scams that Malwarebytes spotted in the wild, with full details on what they say, what they’re lying about, and which malware they’re trying to install on your machine.

Categories:

Tags:

(Read more…)

The post Coronavirus scams, found and explained appeared first on Malwarebytes Labs.

Read more

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read more

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Credit to Author: Pradeep Kulkarni| Date: Thu, 01 Nov 2018 06:17:45 +0000

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering…

Read more

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package

Credit to Author: Gajanan Khond| Date: Fri, 17 Aug 2018 14:12:09 +0000

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibility setting page until the user switches ON the ‘AccessibilityService’. The…

Read more

A Look at Scan4You and the Counter Antivirus Service Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…

The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .

Read more

Information stolen? What now?

Credit to Author: Pieter Arntz| Date: Thu, 18 May 2017 15:00:51 +0000

Identifying and removing the malware is our job, but what do you need to do yourself, to control the aftermath of malware that steals interesting information from an infected computer?

Categories:

Tags:

(Read more…)

The post Information stolen? What now? appeared first on Malwarebytes Labs.

Read more