Malware analysis: decoding Emotet, part 1

In the first part of this two-part analysis of Emotet, we look at the VBA code, where you’ll learn how to recognize and discard “dead” code thrown in to complicate the analysis process.
Categories:

Malware
Threat analysis

Tags: code variationem… Continue reading Malware analysis: decoding Emotet, part 1

New Mac cryptominer uses XMRig

New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs.
Categories:

Mac
Threat analysis

Tags: ApplecryptominercryptominingmacMac cryptominerXMRig

(Read more…)

The post New Mac cryptominer uses XMRig ap… Continue reading New Mac cryptominer uses XMRig

A look into the Drupalgeddon client-side attacks

Back-to-back Drupal zero-day vulnerabilities are being monetized with malicious web cryptominers.
Categories:

Cryptomining
Threat analysis

Tags: CMScontent management systemsdrupaldrupalgeddonmalicious cryptomining

(Read more…)

The p… Continue reading A look into the Drupalgeddon client-side attacks

Adobe Reader zero-day discovered alongside Windows vulnerability

A new Adobe Reader zero-day exploit has been discovered, including a full sandbox escape.
Categories:

Exploits
Threat analysis

Tags: 0dayadobeAdobe ReaderCVE-2018-4990CVE-2018-8120zero day

(Read more…)

The post Adobe Reader zero-day … Continue reading Adobe Reader zero-day discovered alongside Windows vulnerability

Internet Explorer zero-day: browser is once again under attack

Internet Explorer is yet again leveraged for a zero-day exploit delivered via Office document—the first zero-day observed for IE in over two years.
Categories:

Exploits
Threat analysis

Tags: 0dayCVE-2018-8174zero day

(Read more…)

Continue reading Internet Explorer zero-day: browser is once again under attack

Netflix phish claims your membership is on hold

We take a look at a new Netflix phish in circulation, using the time-honored trick of claiming the recipient is about to lose access unless they hand over some personal information.
Categories:

Social engineering
Threat analysis

Tags: Appleemai… Continue reading Netflix phish claims your membership is on hold

Kuik: a simple yet annoying piece of adware

Kuik adware, which forces affected machines to join a domain controller, is using this unusual technique to push Google Chrome extensions and coin miner applications. In this blog, we’ll provide technical analysis of the adware and custom removal … Continue reading Kuik: a simple yet annoying piece of adware

Shoppers Stop tech scam draws from thousands of forced ad injections

The same group behind the Shoppers Stop tech scam campaign is at it again, injecting malicious ad code into thousands of sites and redirecting to a templated warning page.
Categories:

Social engineering
Threat analysis

Tags: malvertisingtech su… Continue reading Shoppers Stop tech scam draws from thousands of forced ad injections

Internet Shortcut used in Necurs malspam campaign

The Necurs gang tries out a new trick to load malware and bypass security defenses.
Categories:

Criminals
Threat analysis

Tags: botnetmalspamnecurssambaSMBspam

(Read more…)

The post Internet Shortcut used in Necurs malspam campaign a… Continue reading Internet Shortcut used in Necurs malspam campaign