New RAT Targets Koreans And Is Skilled At Evading Detection

Cisco Talos researchers spot a stealthy new remote administration tool calling ROKRAT that targets Korean-language Microsoft Word alternative Hangul Word Processor. Continue reading New RAT Targets Koreans And Is Skilled At Evading Detection

Google will provide free cybersecurity tools for election organizers in Europe

As the threat of cyberattacks looms over Europe in the months preceding several crucial elections, Alphabet subsidiary companies Jigsaw and Google announced Tuesday the launch of a security tool package to help election organizers and civic groups ward off hackers and other forms of digital interference. The announcement comes one day after FBI Director James Comey told lawmakers that he fully expects Russian intelligence services to continue interfering in the U.S. electoral process because of their apparent success in 2016. Known as “Protect Your Election,” the Google-Jigsaw cybersecurity software package is designed for use by a nontechnical audience and it will be provided for free to groups in France, South Korea, Germany and counties with subsequent elections, according to Jigsaw, the corporation’s tech incubator. Among other capabilities, the toolset provides technology to help stop distributed denial of service, or DDoS, attacks, spot phishing emails and better protect passwords. DDoS-style attacks work by […]

The post Google will provide free cybersecurity tools for election organizers in Europe appeared first on Cyberscoop.

Continue reading Google will provide free cybersecurity tools for election organizers in Europe

Understanding the Latest Version of Locky Ransomware

It is one of the most prevalent spam malware in the wild today: Locky ransomware. The Locky malware authors started their campaign last year but didn’t become very active until January 2016 – and they haven’t slowed down since. Locky e-mails usually come in with an attached zip archive and once extracted may contain a […]

The post Understanding the Latest Version of Locky Ransomware appeared first on ThreatTrack Security Labs Blog.

Continue reading Understanding the Latest Version of Locky Ransomware

Breaking Down the Malware Behind the Ukraine Power Outage

Security researchers recently discovered that the power outage in the Ukraine in December was caused by a malware and identified as an evolved version of BlackEnergy. This Trojan, dating back to 2007, was a popular malware that was previously sold in Russian underground sites. However, its design and architecture changed from performing simple HTTP DDos attacks to […]

The post Breaking Down the Malware Behind the Ukraine Power Outage appeared first on ThreatTrack Security Labs Blog.

Continue reading Breaking Down the Malware Behind the Ukraine Power Outage

Breaking Down the Malware Behind the Ukraine Power Outage

Security researchers recently discovered that the power outage in the Ukraine in December was caused by a malware and identified as an evolved version of BlackEnergy. This Trojan, dating back to 2007, was a popular malware that was previously sold in Russian underground sites. However, its design and architecture changed from performing simple HTTP DDos attacks to […]

The post Breaking Down the Malware Behind the Ukraine Power Outage appeared first on ThreatTrack Security Labs Blog.

Continue reading Breaking Down the Malware Behind the Ukraine Power Outage