Microsoft Sets Proper Example With Necurs Botnet Takedown

I like to watch old westerns, and there is a common thread that weaves through them that showcases that the lack of cooperation between the states led to profitable criminal organizations, which made living in the Old West very risky. Criminals could c… Continue reading Microsoft Sets Proper Example With Necurs Botnet Takedown

Necurs zombie botnet disrupted by Microsoft

Necurs, one of the world’s biggest botnets, infected over 9 million computers worldwide. Continue reading Necurs zombie botnet disrupted by Microsoft

Necurs Botnet in Crosshairs of Global Takedown Offensive

The tech giant will take control of the U.S.-based infrastructure used by the criminals behind the world’s most prolific botnet used to distribute malware and infect victim computers. Continue reading Necurs Botnet in Crosshairs of Global Takedown Offensive

Nevada data center used to distribute Dridex, GandCrab malware right under the FBI’s nose

Scammers used data centers located in the United States to launch nasty strains of malware against English-speaking web users, according to Bromium research published Thursday. The hacking campaign lasted from May 2018 to last month, and included five families of banking trojans, two families of ransomware and three forms of malware meant to collect victims’ personal information. The cybercriminal operation relied on U.S. data centers, with 11 web servers hosted at BuyVM, a virtual private server company in Nevada. The malware — identified as Neutrino, IcedID, GandCrab, and Dridex, among others — is estimated to have stolen millions from international banks. The location alone makes this operation unusual, Bromium noted, because hackers typically organize in areas outside the FBI’s reach. “It was interesting to us that the hosting infrastructure is located in the United States and not a jurisdiction that is known to be uncooperative with law enforcement,” the researchers […]

The post Nevada data center used to distribute Dridex, GandCrab malware right under the FBI’s nose appeared first on CyberScoop.

Continue reading Nevada data center used to distribute Dridex, GandCrab malware right under the FBI’s nose

Mapping Out a Malware Distribution Network

More than a dozen US-based web servers were used to host 10 malware families, distributed through mass phishing campaigns. Malware families include Dridex, GandCrab, Neutrino, IcedID and others. Evidence suggests the existence of distinct threat actors… Continue reading Mapping Out a Malware Distribution Network

Necurs Botnet Launches Campaign Against Banks

The Necurs botnet has been observed pushing an unusual malware campaign that almost exclusively targets users and employees within the financial sector. Necurs is one of the largest and longest-lived botnet that’s still in operation today. Over t… Continue reading Necurs Botnet Launches Campaign Against Banks

Necurs Botnet Campaign Targets Banks with Malware .Pub Files

The Necurs botnet is being used in a new attack campaign concentrating banks worldwide. The latest security reports indicate that the attackers utilize .PUB files which are Microsoft Publisher documents. Read our article to learn more about the inciden… Continue reading Necurs Botnet Campaign Targets Banks with Malware .Pub Files

Wireless Security: The Next Step, WPA3, Is Ready for Prime Time

WPA3, the new iteration of the Wireless Protected Access (WPA) standard announced earlier this year, has now been added to the Wi-Fi Alliance’s Wi-Fi certification program. This is a major step toward its adoption because wireless device manufac… Continue reading Wireless Security: The Next Step, WPA3, Is Ready for Prime Time