Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk

Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to promote the spoofing of a device. The report also documents how Amazon Sidewal… Continue reading Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk

Are NFTs safe? 3 things you should know before you buy

NFTs, or non-fungible tokens, have captured the attention (and wallets) of consumers and businesses around the world. This is largely in part to the big price-tag sales, such as the digital artwork by Beeple that sold for over $69M on Christie’s Auctio… Continue reading Are NFTs safe? 3 things you should know before you buy

Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT

Fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019, according to WatchGuard. Q4 2020 also brought a 41% increase in encrypted malware detect… Continue reading Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT

New phishing campaign targets taxpayer credentials

A new phishing campaign is targeting U.S. taxpayers with documents that purport to contain tax-related content, but ultimately deliver NetWire and Remcos malware – two prolific remote access trojans (RATs) which allows attackers to take control o… Continue reading New phishing campaign targets taxpayer credentials

Hackers are getting hacked via trojanized hacking tools

Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has revealed. “We have found a widespread hacking campaign that uses the njRa… Continue reading Hackers are getting hacked via trojanized hacking tools

Attackers continue to leverage greater levels of social engineering and sophistication

Despite a nearly four-month absence, the return of Emotet within the last two weeks of September accounted for nearly 12 percent of all malicious email samples in Q3, delivering millions of messages with malicious URLs or attachments, Proofpoint found…. Continue reading Attackers continue to leverage greater levels of social engineering and sophistication

FlawedAmmy: Dangerous RAT enteres most wanted malware list

The latest Check Point Global Threat Index reveals that while cryptomining malware continues to dominate the rankings, a remote access Trojan has reached the top ten’s list for the first time. During the month of October, Check Point researchers discov… Continue reading FlawedAmmy: Dangerous RAT enteres most wanted malware list

XPCTRA financial malware leaves no stone unturned

A Trojan that has previously been only stealing users’ banking credentials has been modified to do much more than that. This new variant, dubbed XPCTRA, can also steal users credentials for bitcoin cryptocurrency wallet Blockchain.info, online e-payment service PerfectMoney, e-wallet provider Neteller, as well as email credentials. The XPCTRA financial malware threat The threat was discovered and analyzed by Morphus Labs CRO (and SANS ISC incident handler) Renato Marinho, who says that the sample he … More Continue reading XPCTRA financial malware leaves no stone unturned

Malware Hunter Crawls Internet Looking for RAT C2s

A new crawler from Shodan and Recorded Future called Malware Hunter seeks out command and control servers managing endpoints infected with remote access Trojans and other malware. Continue reading Malware Hunter Crawls Internet Looking for RAT C2s