Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia

To understand the similarities between ZeroCleare and Dustman, IBM X-Force researchers took a closer look at their code and the files being used in attacks.

The post Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia appeared first on Security Intelligence.

Continue reading Enter Dustman: New Wiper Takes After ZeroCleare, Targets Organizations in Saudi Arabia

From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications

MegaCortex seems to be looking for ways to improve, and with each version upgrading the previous release’s functions, our team took a closer look at some of the highlights.

The post From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications appeared first on Security Intelligence.

Continue reading From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications

The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

Malware on official mobile app stores is a growing concern for all users. Increasingly, malware developers are getting around sophisticated app store controls by using mobile malware downloaders.

The post The Role of Evil Downloaders in the Android Mobile Malware Kill Chain appeared first on Security Intelligence.

Continue reading The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

HawkEye Malware Operators Renew Attacks on Business Users

IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.

The post HawkEye Malware Operators Renew Attacks on Business Users appeared first on Security Intelligence.

Continue reading HawkEye Malware Operators Renew Attacks on Business Users

Credential Dumping Campaign Hits Multinational Corporations

X-Force researchers observed attackers targeting multinational corporations in various sectors using malicious scripts to automate attacks on misconfigured servers.

The post Credential Dumping Campaign Hits Multinational Corporations appeared first on Security Intelligence.

Continue reading Credential Dumping Campaign Hits Multinational Corporations

Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns

IBM X-Force researchers observed cybercriminals engaging in three tax-themed malware campaigns likely aimed at businesses but with the potential to spread to consumers as well.

The post Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns appeared first on Security Intelligence.

Continue reading Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns

Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control

IBM X-Force found a zero-day buffer overflow vulnerability in one of the most common routers on the market that could let malicious third parties take control of the device from a remote location.

The post Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control appeared first on Security Intelligence.

Continue reading Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control

Busting Cybersecurity Silos

To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape.

The post Busting Cybersecurity Silos appeared first on Security Intelligence.

Continue reading Busting Cybersecurity Silos

IBM Security Named a Leader in IDC Incident Response MarketScape Report

This year, IDC recognized IBM X-Force Incident Response and Intelligence Services (IRIS) for effectively streamlining incident response (IR) for customers around the globe.

The post IBM Security Named a Leader in IDC Incident Response MarketScape Report appeared first on Security Intelligence.

Continue reading IBM Security Named a Leader in IDC Incident Response MarketScape Report

Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers

X-Force observed attackers using known Drupal vulnerabilities, including Drupalgeddon, to target websites and the underlying infrastructure that hosts them, leveraging Shellbot to open backdoors.

The post Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers appeared first on Security Intelligence.

Continue reading Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers