RIG EK covertly delivers cryptocurrency miners

Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. They trick victims into installing mining software, hijack their CPU’s po… Continue reading RIG EK covertly delivers cryptocurrency miners

Disdain exploit kit served with a side of social engineering

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.
Categories:

Exploits
Threat analysis

Tags: DisdainEKexploit kitneutrino

(Read more…)

The post Disdain exploi… Continue reading Disdain exploit kit served with a side of social engineering

A week in security (August 28 – September 3)

Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived into Locky, again, a ransomware that just made a comeback, and found that its latest variant (as of this writing) has anti-sandboxing capabilities. This means that once Locky has determined that it’s residing in…

Categories:

Tags:

(Read more…)

The post A week in security (August 28 – September 3) appeared first on Malwarebytes Labs.

Continue reading A week in security (August 28 – September 3)

Cerber ransomware delivered in format of a different order of Magnitude

We review a trick that the Magnitude exploit kit uses to bypass security scanners.
Categories:
Exploits
Threat analysis
Tags: binary paddingcerberexploit kitgateMagnigatemagnitude EKransomwareXML

(Read more…)

The post Cerber ransomware delivered… Continue reading Cerber ransomware delivered in format of a different order of Magnitude

Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain

This post shines some light on a ‘gate’ belonging to the geo-targeted Magnitude exploit kit.
Categories:
Cybercrime
Exploits
Tags: cerberEKexploit kitkoreaMagnigateMagnitudemalvertisingransomware

(Read more…)

The post Enemy at the gates: Reviewi… Continue reading Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain

Report: Second quarter dominated by ransomware outbreaks

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Categories:

Tags:

(Read more…)

The post Report: Second quarter dominated by ransomware outbreaks appeared first on Malwarebytes Labs.

Continue reading Report: Second quarter dominated by ransomware outbreaks

AdGholas malvertising thrives in the shadows of ransomware outbreaks

Several large malvertising campaigns went unnoticed amidst the news of the latest ransomware outbreak.
Categories:
Cybercrime
Exploits
Tags: adgholasastrumEKexploit kitmalvertising

(Read more…)

The post AdGholas malvertising thrives in the shado… Continue reading AdGholas malvertising thrives in the shadows of ransomware outbreaks

The numeric Tech Support Scam campaign

A new tech support scam campaign is being pushed in lieu of exploit kits. We take a look at its distribution method and how it is able to bring browsers to their knees.
Categories:
Social engineering
Threat analysis
Tags: eitestexploit kitmalvertisin… Continue reading The numeric Tech Support Scam campaign