Explained: WMI hijackers

This post describes how WMI hijackers work and why they are hard to find on an affected system. It also shows an example of such a hijacker called Yeabests after the domain it hijacks to.Categories: Cybercrime
MalwareTags: elexhijackerPieter ArntzPUPs… Continue reading Explained: WMI hijackers

File-in-the-middle hijackers

This may be a new trend among browser hijackers, but it seems more than a coincidence that we found two browser hijackers using a very similar approach to reach their goal of taking victims to the sites of their choice.Categories: Cybercrime
MalwareTa… Continue reading File-in-the-middle hijackers

PUP Friday: Adware family EoRezo

EoRezo is a detection name that is in use for a big part of the adware family called Tuto4PC. The adware is bundled with other software and with tutorials (about software). The adware, although annoying, is usually harmless by itself, but that can’t be said about the advertisements and sites it opens on the victim’s computer.

Categories:

Tags:

(Read more…)

Continue reading PUP Friday: Adware family EoRezo

Intentional security holes

Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field. Categories: Cybercrime
Social engineeringTags: Pieter Arntzsinkholesinkholesthe mo… Continue reading Intentional security holes