Anatomy of an hVNC Attack

Cybercriminals who rely on remote control tactics to commit financial fraud may use hidden virtual network computing (hVNC) modules to cover their tracks.

The post Anatomy of an hVNC Attack appeared first on Security Intelligence.

Continue reading Anatomy of an hVNC Attack

Exposing AV-Disabling Drivers Just in Time for Lunch

IBM X-Force researchers discovered malicious AV-disabling drivers while investigating a financial malware campaign targeting Brazilian bank accounts.

The post Exposing AV-Disabling Drivers Just in Time for Lunch appeared first on Security Intelligence.

Continue reading Exposing AV-Disabling Drivers Just in Time for Lunch

Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations

Researchers discovered a new banking Trojan, TrickBot, that appears to borrow an uncommon webinjection technique from the infamous Dyre family of malware.

The post Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations appeared first on Security Intelligence.

Continue reading Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations

Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor

URLZone, a sophisticated banking Trojan that first emerged in 2009, keeps its inner workings under wraps with extensive anti-research features.

The post Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor appeared first on Security Intelligence.

Continue reading Fighting Fire With WinDBG: Breaking URLZone’s Anti-VM Armor

Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym

IBM X-Force researchers recognized that the GozNym banking malware leverages features from two types of malware to make it double the threat.

The post Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym appeared first on Security Intelligence.

Continue reading Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym