Bill Toulis reports: The “MalwareHunter” research team has discovered a malicious process that turns the Discord chat app client into a password stealer. The threat actor who is engaging in this campaign is deploying a custom spin of the “AnarchyGrabbe… Continue reading Trojanized Discord Client Grabs Passwords and User Tokens
I was scrolling on two completely separate web pages, pages I have visited many times before. However they do both have ads. My browser is Opera, and I use an adblocker (on the other site it doesn’t always block all ads). After opening the… Continue reading Browser threw me on same ad-site some seconds after scrolling on completely separate webpages
I was finishing a clean installation of macOS Catalina on my MacBook, and I was asked to select a wifi network. I misclicked on a wifi network with a name that’s very similar to mine and was asked to enter the password, obviously I cancell… Continue reading Can a computer/MacBook be compromised/infected/hacker simply be requesting/attempt to join a network?
I published the following diary on isc.sans.edu: “AgentTesla Delivered via a Malicious PowerPoint Add-In“: Attackers are always trying to find new ways to deliver malicious code to their victims. Microsoft Word and Excel are documents that can be easily weaponized by adding malicious VBA macros. Today, they are one of
[The post [SANS ISC] AgentTesla Delivered via a Malicious PowerPoint Add-In has been first published on /dev/random]
In the nearly four decades since the first PC viruses spread in the wild, malware writers have evolved some exceptionally clever ways to hide their creations from system administrators and from anti-virus writers. The researchers at Sophos have found one that conceals itself as probably the ultimate Trojan horse: it …read more
If AV auto-scan will detect and prevent the malware from executing why there is a need to enable schedule/full scans?
I’m asking because a full scan can create sometimes overhead on the machine and network, so I’m trying to understand th… Continue reading What are the benefits of enabling antivirus full scanning?
When i run the command netstat -a to see the actual connections on my computer , i see all the time that my computer is connected to something like this ec2-xx-xx-xx-xx , not just one address it changes many times
Proto —- local addres… Continue reading Why is my computer connected to amazon instances
By Deeba Ahmed
Winnti hacking group previously targeted GRAVITY gaming firm in South Korea.
This is a post from HackRead.com Read the original post: Winnti hacking group hits gaming firms with new backdoor malware
Continue reading Winnti hacking group hits gaming firms with new backdoor malware
Many website owners don’t know they’re infected with malicious redirects until they start getting calls from wary customers. Instead of the site they were expecting, it loaded some pretty shady content from the nether reaches of the intern… Continue reading Understanding & Stopping Malicious Redirects
The Ragnar Locker ransomware has been deploying a full virtual machine to ensure that it can evade detection, Sophos reveals.