Konni RAT variant targeting Russia in ongoing attack campaign

By Waqas
So far, Konni RAT has managed to evade detection as only 3 security solutions on VirusTotal were able to detect the malware.
This is a post from HackRead.com Read the original post: Konni RAT variant targeting Russia in ongoing attack campaign
Continue reading Konni RAT variant targeting Russia in ongoing attack campaign

Malwarebytes integrates with Datto to to streamline endpoint security for MSPs

Malwarebytes announced that Malwarebytes OneView is now integrated with Datto Remote Monitoring and Management (RMM) and Datto Autotask Professional Services Automation (PSA). Datto is a global provider of cloud-based software and security solutions pu… Continue reading Malwarebytes integrates with Datto to to streamline endpoint security for MSPs

Malware spammers aim to leverage Kaseya ransomware drama in email campaign

First came the ransomware rampage stemming from the breach of Miami-based software firm Kaseya. Now comes a wave of malicious emails seeking capitalize on the rush to find a fix. Security vendor MalwareBytes highlighted the malware spam campaign Tuesday, describing how unidentified attackers send “malspam” messages with both a URL and a file that purports to be a Microsoft update of the Kaseya VSA vulnerability. Clicking on the the link, or “SecurityUpdates.exe,” drops Cobalt Strike on a victim. Cybercriminals have increasingly leveraged that security testing tool for attacks, according to recent research. It’s another example of how cyberattacks can have long tails after their initial infections. The zero-day vulnerability that the ransomware gang REvil apparently used to infiltrate Kaseya systems turned into a way for intruders to access the systems of Kaseya’s managed service provider customers, who provide IT services to a wider range of potential victims. It has turned […]

The post Malware spammers aim to leverage Kaseya ransomware drama in email campaign appeared first on CyberScoop.

Continue reading Malware spammers aim to leverage Kaseya ransomware drama in email campaign

Criminals leveraging shift to remote work to develop targeted attacks

Malwarebytes announced the findings of its report which explores how the global pandemic forced many employees to quickly become a remote workforce and confined consumers to their homes. In the wake of this change, cybercriminals ditched many of their … Continue reading Criminals leveraging shift to remote work to develop targeted attacks

Barcode scanner in Google Play Store became malware after years of popularity, researchers say

An app with more than 10 million downloads from the Google Play Store recently took a hard turn to the dark side, according to antivirus company Malwarebytes. The Barcode Scanner app had appeared in the store for years, but in December it became clear that it “had gone from an innocent scanner to full on malware,” writes Nathan Collier, a researcher for the Silicon Valley company. Malwarebytes said Google Play removed the app in early December after users reported that it was opening the default web browsers on phones to serve up ad pages — without any direct action by the device owners themselves. The company is labeling the malicious code as a trojan. “It is frightening that with one update an app can turn malicious while going under the radar of Google Play Protect,” Collier writes. The researcher makes a clear distinction: There are many ways apps can go […]

The post Barcode scanner in Google Play Store became malware after years of popularity, researchers say appeared first on CyberScoop.

Continue reading Barcode scanner in Google Play Store became malware after years of popularity, researchers say

Malwarebytes says it was also breached by SolarWinds hackers

By Waqas
According to Malwarebytes, SolarWinds hackers accessed its internal email communication. Here’s what we know so far.
This is a post from HackRead.com Read the original post: Malwarebytes says it was also breached by SolarWinds hackers
Continue reading Malwarebytes says it was also breached by SolarWinds hackers

Malwarebytes was breached by the SolarWinds attackers

A fourth malware strain wielded by the SolarWinds attackers has been detailed by Symantec researchers, followed by the disclosure of the attackers’ ingenous lateral movement techniques and the release of an auditing script by FireEye researchers … Continue reading Malwarebytes was breached by the SolarWinds attackers

Be Very Sparing in Allowing Site Notifications

An increasing number of websites are asking visitors to approve “notifications,” browser modifications that periodically display messages on the user’s mobile or desktop device. In many cases these notifications are benign, but several dodgy firms are paying site owners to install their notification scripts and then selling that communications pathway to scammers and online hucksters. Continue reading Be Very Sparing in Allowing Site Notifications

Malwarebytes Remediation solutions now available to CrowdStrike’s Fortune 1000 customers

Malwarebytes announced that it will be offering their remediation solution to CrowdStrike customers to elevate and simplify enterprise remediation efforts. The custom offering, Malwarebytes Remediation for CrowdStrike, integrates with CrowdStrike&#8217… Continue reading Malwarebytes Remediation solutions now available to CrowdStrike’s Fortune 1000 customers