TrickBot comes with new tricks – attacking Outlook and browsing data

TrickBot is still actively maintained and it is not going to leave the landscape any soon. Take a look at its new modules.

Categories:

Tags:

(Read more…)

The post TrickBot comes with new tricks – attacking Outlook and browsing data appeared first on Malwarebytes Labs.

Continue reading TrickBot comes with new tricks – attacking Outlook and browsing data

EternalPetya – yet another stolen piece in the package?

Since 27th June we’ve been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since the day one, various contradicting theories started popping up. Some believed, that it is a rip-off the original Petya, others – that it is another step in its evolution. However, so far, those were just different opinions, and none of them was backed up with enough evidence. In this post, we will try to fill this gap, by making a step-by-step comparison of the current kernel and the one on which it is based (Goldeneye Petya).

Categories:

Tags:

(Read more…)

The post EternalPetya – yet another stolen piece in the package? appeared first on Malwarebytes Labs.

Continue reading EternalPetya – yet another stolen piece in the package?

EternalPetya and the lost Salsa20 key

The latest Petya seems to be broken on purpose: the victims’ keys are lost forever.
Categories:
Malware
Threat analysis
Tags: EternalPetyagoldeneyepetyaPetya ransomwareransomwareWanaCrypt0rWannaCryWannaCrypt

(Read more…)

The post EternalPetya an… Continue reading EternalPetya and the lost Salsa20 key

The numeric Tech Support Scam campaign

A new tech support scam campaign is being pushed in lieu of exploit kits. We take a look at its distribution method and how it is able to bring browsers to their knees.
Categories:
Social engineering
Threat analysis
Tags: eitestexploit kitmalvertisin… Continue reading The numeric Tech Support Scam campaign

New social engineering scheme triggers on mouse movement

No macro, no exploit. This attack uses mouse movement to launch malicious code in booby-trapped documents.
Categories:
Social engineering
Threat analysis
Tags: PowerPointpowershellSocial Engineering

(Read more…)

The post New social engineering s… Continue reading New social engineering scheme triggers on mouse movement

Spotting fake reviews – have healthy online skepticism

In this blog, we discuss techniques to detect fake reviews, fake reviewers, and shady online image management techniques.

Categories:

Tags:

(Read more…)

The post Spotting fake reviews – have healthy online skepticism appeared first on Malwarebytes Labs.

Continue reading Spotting fake reviews – have healthy online skepticism

The worm that spreads WanaCrypt0r

WanaCrypt0r is a ransomware infection that has spread through many corporate networks. Read a technical analysis of the worm that allowed it to do this.
Categories:
Malware
Threat analysis
Tags: microsoftNHSNHS WanaCryptornhs wannacryptorransomwareWa… Continue reading The worm that spreads WanaCrypt0r

The worm that spreads WanaCrypt0r

WanaCrypt0r is a ransomware infection that has spread through many corporate networks. Read a technical analysis of the worm that allowed it to do this.
Categories:
Malware
Threat analysis
Tags: microsoftNHSNHS WanaCryptornhs wannacryptorransomwareWa… Continue reading The worm that spreads WanaCrypt0r

HandBrake hacked to drop new variant of Proton malware

The website of the popular HandBrake DVD-ripping app has been hacked, and for 4 days, a maliciously-modified copy of the app was installing a new variant of the mysterious Proton malware.
Categories:
Mac
Threat analysis
Tags: apple phishingbackdoorEr… Continue reading HandBrake hacked to drop new variant of Proton malware