You Are Here: Home » Posts tagged "malware"

Malware Found in Chinese E-Cigarettes’ Charger; Company Exec Infected

It hasn’t yet been proven that e-cigarettes can cause cancer, but they just might be able to give you malware. A recent report on Reddit posted by one IT employee suggested that e-cigarettes made in China had malware hard coded in their chargers. "One particular executive had a malware infection on his computer from which the source could not be determined,” the Reddit post said. “After all traditional mean...

New iOS and OS X Malware Infects Non-Jailbroken Apple Devices

WireLurker is the “biggest in scale” iOS and OS X malware to install “trojanized” apps through USB connections on non-jailbroken iOS devices, according to a report by Palo Alto Networks. “WireLurker is now the only known active, non-jailbroken malware threat putting over 800 million iOS devices at risk,” the report says. In the past six months, the new malware family infected 467 OS X apps on the Maiyadi Ap...

BlackEnergy Malware Compromises US SCADA Systems; US CERT Says

The BlackEnergy malware toolkit has been compromising US SCADA (Supervisory Control and Data Acquisition) systems in a sophisticated campaign, according to the US Computer Emergency Response Team's advisory. SCADA systems compromised with BlackEnergy included those of GE Cimplicity, Advantech/Broadwin WebAccess and Siemens WinCC, while there is still no evidence that the compromised systems were disrupted o...

Dyre Banking Trojan Still Phishing for Data, US-CERT Warns

A new phishing campaign employs the Dyre banking Trojan to steal account credentials from enterprises and financial institutions, according to an alert by the Department of Homeland Security. In the advisory, US-CERT said the phishing campaign uses various tactics, but mostly malicious PDF email attachments to download malware. “Phishing emails used in this campaign often contain a weaponized PDF attachment...

FBI infected 15-year-old bomb threat twit with malware, by impersonating newspaper

The Seattle Times is furious, after discovering that the FBI stole its identity.   Documents obtained by the Electronic Freedom Foundation (EFF) show that, while attempting to identify who had made a series of high school bomb threats, the FBI created a fake Seattle Times webpage containing a bogus Associated Press news story, with the intention of infecting a suspect's computer with malware. What was...

Tor Exit Node Patches Malware on Executable Downloads

Downloaded binaries through a Russia-based Tor exit node has been found to patch malware onto binaries, according to a blog post by Leviathan Security. The findings, by Josh Pitts, are based on his research on Man-in-the-Middle binary patching using the Backdoor Factory patching framework. Pitts also checked if Windows Update packages wrapped in Windows Portable Executable (PE) format are patched with the m...

Malware Writers Target SMB Employees with Fake Policy Violation

A new cyber-crime attack tricks SMB employees into downloading Zbot and other Trojans by accusing them of violating company policy, according to antivirus software provider Bitdefender. The spam wave started to accelerate a week ago with dozens of unique .ARJ compressed files infecting computers, as the Bitdefender AntiSpam Laboratory has determined.  The malware attack is based on Zbot or Zeus, which inclu...

Government Gateway attack attempts to spread malware, with a little help from a body builder

If you live in the UK, chances are that you may find yourself using the Government Gateway website. The Government Gateway website, which resides at www.gateway.gov.uk, is the central portal that British citizens can use for any number of government services. Whether you're filing your self assessment tax return, replacing your driving license, or allocating ear tags for sheep and goats (yes, really...) the...

Dyre malware targets millions of Salesforce users, stealing passwords and bypassing 2FA

We're all used to the idea of malware which snoops upon our online banking, attempting to steal our login credentials to help hackers gain access to our bank accounts. Many of us are also aware of spyware trojan horses that target users of other websites, including popular webmail services or social networks, in the hope of plundering private information or using the platforms as a springboard for other att...

Hackers plotted fake Flappy Bird app to steal girls’ photos from Android phones

Next time you install an app on your phone, you'd best think twice if it asks permission to access your photos. As The Guardian reports, following a tweet from security researcher Nik Cubrilovic, the very same hackers who merrily collected naked photos of more than 100 female celebrities, including Oscar-winning actress Jennifer Lawrence, had plotted a variety of dirty tricks to increase their haul. At leas...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top