malware

48 Articles 0 Followers


Malware Counter Measure Standard Operation Procedure in Old Corporations

31 Jan 2021 4 minute read 1 comment 0fajarpurnama0

I have a few experience in playing around with cyber attacks, but it was merely a curiosity and I did this on my own PCs and virtual machines. Back then I tried exploiting the vulnerability on port 445 SMB using an exploit prepared by Metasploit. Met...

Disrupted but Not Dead – Law Enforcement Scores a Big Win Against EMOTET Botnet

30 Jan 2021 1 minute read 0 comments Matthew Rosenquist

Congrats to the multinational authorities who collaborated to defang the infrastructure of EMOTET, a hugely successful cybercriminal malware platform. Unfortunately, this win may be short-lived. The attackers behind EMOTET have shown great resilienc...

Dealing with Malware for Ordinary Users

27 Jan 2021 3 minute read 2 comments 0fajarpurnama0

The countermeasures of Malicious Ware (malware) are mitigation (prevention) or treatment like any other measures to cope against harmful substances. To prevent virus/worm infection is either we put up security to defend ourselves or avoid interacting...

Three apps that were stealing crypto undetected for more than a year

8 Jan 2021 2 minute read 4 comments Heruvim78

Security firm Intezer Labs discovered a malware that was running undetected for more than a year, using face apps and emptying wallets for thousands users, indiscriminately infecting Windows, macOS and Linux operating systems.  The remote access troj...

ElectroRAT malware targets Crypto users via fake Apps

7 Jan 2021 2 minute read 3 comments FKlivestolearn

Hackers have been running this malware operation since the beginning of 2020, with the end goal of stealing victims’ funds Weare still reeling from the massive hack that was discovered last month in which the Russian hackers managed to hack into mult...

Why TrickBot Malware may be a Game Changer for Cybersecurity

4 Dec 2020 1 minute read 1 comment Matthew Rosenquist

Cyber attackers continue to move down the compute stack with the latest variant of TrickBot now targeting firmware for malicious manipulations.  This is when it gets serious.  The firmware sits below the operating system and is a perfect place for m...

Darkside Group donates Bitcoin to charities

27 Oct 2020 2 minute read 10 comments PVM

If you enjoyed the story of SAMCZUN, a White Hat Hacker that saved $10 million ETH from vanishing in unknown wallets which he found vulnerable in the Dark Forrest, you will definitively enjoy this one as well. Darkside Group donated $10,000 worth of...

Cyber Threats Enhance Phishing with AI and Worm Functions for Rapid Disruption

20 Oct 2020 1 minute read 4 comments Matthew Rosenquist

New phishing malware leverages Artificial Intelligence and worm functionality to rapidly spread to contacts of victims.  By leveraging previously established relationships the malware can bypass technical controls and easily fool new targets into be...

Is Paying Ransomware Now Illegal?

17 Oct 2020 1 minute read 3 comments Matthew Rosenquist

Security experts say don't pay ransomware, but now the U.S. Treasury Department is now declaring it illegal!  Every company on the Internet must deal with the threat and emerging regulations.  Ransomware continues to be a growing problem because vic...

Sophisticated Andriod Ransomware MalLocker With New String

10 Oct 2020 1 minute read 0 comments NRWRecords

  Cybersecurity researchers at Microsoft have detected a risky new string of MalLocker, an ever-changing Smartphone ransomware descent that has swamped in the wild ever since least 2014.   The new version is notably designed to cover the ransom dema...