Chinese PUPs and backdoor drivers: making systems less secure since 2013

In this blog, we expose a family of backdoor drivers that have been included in various PUPs of Chinese origin for several years.
Categories:
Malware
PUP/PUM
Threat analysis
Tags: IOCTLPUPPUPs

(Read more…)

The post Chinese PUPs and backdoor driv… Continue reading Chinese PUPs and backdoor drivers: making systems less secure since 2013

Why Malwarebytes detects PC Pitstop as Potentially Unwanted

PC Pitstop makes several products including PC Matic, PC Magnum, Optimize, Driver Alert, and Disk MD. As of a few weeks ago, we detect these products as PUP.Optional, here is why.Categories: PUP/PUMTags: Disk MDDriver AlertMalwarebytesOptimizePC Magnum… Continue reading Why Malwarebytes detects PC Pitstop as Potentially Unwanted

An overview of malvertising on the Mac

Mac users may face less malware attacks than their Windows counterparts, but it doesn’t mean they are safe from online crooks. In this post we review the top malvertising attacks that target the OS X platform and how to stay safe.Categories: Social eng… Continue reading An overview of malvertising on the Mac

PUP Friday: Content Protector

Content Protector is an adware that is offered as a netfiltering program. This seems a bit strange for ad-supported software. It also comes with it’s own certificate.Categories: PUPs
Threat analysisTags: adwarecontent defenderContent protectornetfilte… Continue reading PUP Friday: Content Protector

Youndoo creates new Chrome profile

A new Youndoo hijacker from the Elex family copies most of the settings from an existing Chrome user account to create a fake, infected one.Categories: Cybercrime
MalwareTags: browser hijackerchromeelexfake Chrome profilePieter ArntzPUPPUPsYoundoo(Rea… Continue reading Youndoo creates new Chrome profile

PUP Friday: Let’s talk generic

For this PUP Friday post, we’re going to look into PUPs that we can simply classify as “Downloaders”. We have sampled a program called the Internet Download Manager, which is capable of downloading other files we detect as PUP and connects to sites lea… Continue reading PUP Friday: Let’s talk generic

Explained: WMI hijackers

This post describes how WMI hijackers work and why they are hard to find on an affected system. It also shows an example of such a hijacker called Yeabests after the domain it hijacks to.Categories: Cybercrime
MalwareTags: elexhijackerPieter ArntzPUPs… Continue reading Explained: WMI hijackers