Interesting disguise employed by new Mac malware HiddenLotus

A new piece of Mac malware called HiddenLotus is using a clever new trick to fool users into opening it.
Categories:

Mac
Threat analysis

Tags: Applefile quarantinehiddenlotusmacMac applicationsmac malwaremacOS

(Read more…)

The post I… Continue reading Interesting disguise employed by new Mac malware HiddenLotus

Seamless campaign serves RIG EK via Punycode

The most prolific gate to the RIG exploit kit is coming in a different flavor. The Seamless campaign is now using a domain name with foreign characters translated by Punycode.
Categories:

Exploits
Threat analysis

Tags: phishingPunycoderamnitRam… Continue reading Seamless campaign serves RIG EK via Punycode

Yet another flaw in Apple’s “iamroot” bug fix

Flaws in Apple’s response to the “iamroot” vulnerability show that some systems can remain vulnerable even after applying the patch.
Categories:

Mac
Threat analysis

Tags: AppleHigh Sierraiamrootmac vulnerabilitymacOS

(Read more…)

The… Continue reading Yet another flaw in Apple’s “iamroot” bug fix

Yet another flaw in Apple’s “iamroot” bug fix

Flaws in Apple’s response to the “iamroot” vulnerability show that some systems can remain vulnerable even after applying the patch.
Categories:

Mac
Threat analysis

Tags: AppleHigh Sierraiamrootmac vulnerabilitymacOS

(Read more…)

The… Continue reading Yet another flaw in Apple’s “iamroot” bug fix

Terror exploit kit goes HTTPS all the way

A look at some techniques used by the Terror exploit kit to evade traffic-based detection.
Categories:

Exploits
Threat analysis

Tags: exploit kitsmalvertisingPropeller Ads Mediasmoke loaderTerror EKTerror exploit kit

(Read more…)

The… Continue reading Terror exploit kit goes HTTPS all the way

Terdot Trojan likes social media

The Terdot Trojan is a banker, but it loves to steal your social networks credentials as well.
Categories:

Malware
Malwarebytes news
Threat analysis

Tags: bankerfacebooksocial mediaterdottrojantwitter

(Read more…)

The post Terdot Tro… Continue reading Terdot Trojan likes social media

OSX.Proton spreading through fake Symantec blog

A new variant of the OSX.Proton malware is being promoted via a fake Symantec blog site.
Categories:

Mac
Threat analysis

Tags: CoinThiefmalwareOSX.ProtonprotonProton malwaresymantecSymantec blogSymantec Malware Detector

(Read more…)

Continue reading OSX.Proton spreading through fake Symantec blog

Augmented Reality games and real-world trolling

The popular Augmented Reality game Ingress has had some issues with third-party tools causing headaches for players. Could your love for a mobile game result in real-world problems? Read on and find out.
Categories:

Social engineering
Threat ana… Continue reading Augmented Reality games and real-world trolling

Disdain exploit kit served with a side of social engineering

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.
Categories:

Exploits
Threat analysis

Tags: DisdainEKexploit kitneutrino

(Read more…)

The post Disdain exploi… Continue reading Disdain exploit kit served with a side of social engineering

BadRabbit: a closer look at the new version of Petya/NotPetya

BadRabbit, a new version of NotPetya, also has an infector allowing for lateral movements. However, unlike NotPetya, it does not use EternalBlue and uses a website to drop its payload. We take a closer look at this new ransomware variant.
Categor… Continue reading BadRabbit: a closer look at the new version of Petya/NotPetya