‘Hidden Bee’ miner delivered via improved drive-by download toolkit

Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign.
Categories:

Exploits
Threat analysis

Tags: bootkitcryptominerdrive-by attackexploithidden beehidden bee minerMBR

(Read more…… Continue reading ‘Hidden Bee’ miner delivered via improved drive-by download toolkit

New strain of Mac malware Proton found after two years

A new variant of the Mac malware Proton, which was rampant on macOS last year, has been found dating back to at least two years ago. Learn how this could still affect your Mac today.
Categories:

Mac
Threat analysis

Tags: AppleCalistomacProton m… Continue reading New strain of Mac malware Proton found after two years

Decision Analysis Applications in Threat Analysis Frameworks

Cybersecurity is generally considered to be a highly reactive field where professionals struggle to keep up with new and emerging threats. As the profession works to become more human-centered and proactive, I have attempted to design a new modeling pr… Continue reading Decision Analysis Applications in Threat Analysis Frameworks

Obfuscated Coinhive shortlink reveals larger mining operation

A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.
Categories:

Cryptomining
Threat analysis

Tags: cnhvcoinhiveminingmoneroshortlinks

(Read more…… Continue reading Obfuscated Coinhive shortlink reveals larger mining operation

New macro-less technique to distribute malware

The latest macro-less technique to distribute malware via Office documents does not involve exploits. Just a little bit of social engineering.
Categories:

Threat analysis

Tags: deeplinkmacro-lessmalwareOfficesettingcontent-ms

(Read more…)
Continue reading New macro-less technique to distribute malware

SamSam ransomware: controlled distribution for an elusive malware

SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.
Categories:

Malware
Threat analysis

Tags: ransomwaresamsamsamsam ransomware

(Read more…)

The post SamS… Continue reading SamSam ransomware: controlled distribution for an elusive malware

Instagram story spam claims free Apple Watch

We take a look at Instagram story spam leading to a “free Apple Watch” giveaway on a recently compromised celebrity account.
Categories:

Social engineering
Threat analysis

Tags: Apple WatchInstagramscamsocial mediasocial networkspamsurveysurvey… Continue reading Instagram story spam claims free Apple Watch

Malware analysis: decoding Emotet, part 1

In the first part of this two-part analysis of Emotet, we look at the VBA code, where you’ll learn how to recognize and discard “dead” code thrown in to complicate the analysis process.
Categories:

Malware
Threat analysis

Tags: code variationem… Continue reading Malware analysis: decoding Emotet, part 1

New Mac cryptominer uses XMRig

New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs.
Categories:

Mac
Threat analysis

Tags: ApplecryptominercryptominingmacMac cryptominerXMRig

(Read more…)

The post New Mac cryptominer uses XMRig ap… Continue reading New Mac cryptominer uses XMRig