Malware - Свежие новости [ Фото в новостях ] | |
Hackers are Stealing Crypto Using Clipper Malware
Hackers can steal crypto payments by using a relatively new malware that replaces the receiving address between copying and pasting. Don’t CTRL+C CTRL +V According to a report from February of this year, a security researcher called Lukas Stefanko discovered that hackers had brought the so-called Clipper Malware to Google Play via infected cryptocurrency apps. дальше »
2019-12-4 12:16 | |
Newly Circulating Bitcoin Ransomware Permanently Encrypts Files
A report released by BleepingComputer says there’s a malware asking for a Bitcoin ransom circulating. It can encrypt files, meaning it doesn’t only send empty messages. According to the same report, DeathRansom faked encrypting files in the beginning and became widely known, but soon after it has started to make files unusable. No Details on […] дальше »
2019-11-27 01:18 | |
New Crypto-Stealing Malware Infected 80,000 Computers, Microsoft Says
Microsoft reveals that new crypto-stealing malware “Dexphot” already infected 80,000 devices earlier this year
дальше »2019-11-27 23:01 | |
Monero Warns Users of Malware Ahead of Hard Fork
XMR users who downloaded binary files in the past 24 hours or so might have installed malware, Monero said via its official site getmonero. org. Users Notice Weird Binary Files Some of the CLI binary files that users downloaded from getmonero have been compromised, according to Monero developers. дальше »
2019-11-20 15:45 | |
Was Hack on Indian Nuclear Plant Used to Test Cyber Intrusion Abilities?
The Nuclear Power Corporation of India has confirmed the discovery of malware on its network. According to a statement, the infection was found on a central computer that was not connected to the more sensitive internal systems. дальше »
2019-11-1 21:09 | |
Cryptomining Attacks Remain One of the Nastiest Malware Threats of 2019
Ransomware-as-a-service, intricate phishing scams, cryptomining and cryptojacking schemes: Ransomware attacks will continue as long as cryptocurrency remains valuable. The post Cryptomining Attacks Remain One of the Nastiest Malware Threats of 2019 appeared first on Bitcoin Magazine. дальше »
2019-10-29 17:37 | |
Supply chains show their weaknesses following Avast and NordVPN attacks
Antivirus solution provider Avast and VPN service NordVPN both disclosed data breaches caused by exposed credentials that granted attackers remote access to internal systems. The twin developments come as supply chain attacks — compromising a third-party vendor with a connection to the true target — targeting security-related apps are becoming a common vector to install malware. дальше »
2019-10-22 16:20 | |
SonicWall sees increase in IoT malware, encrypted threats and web app attacks
SonicWall, the trusted security partner protecting more than 1 million networks worldwide, today released new threat intelligence data from SonicWall Capture Labs, revealing 7. 2 billion malware attacks were launched in the first three quarters of 2019 as well as 151. дальше »
2019-10-22 13:40 | |
Zcash (ZEC) Warn Users Against Fake Wallet on GitHub
Zcash (ZEC), one of the established privacy-protecting altcoins, has warned users against a fake version of its native ZEC Wallet on GitHub. The team says the fake wallet has an entirely different URL from the official ZEC Wallet repository on GitHub and may contain potentially harmful malware, according to a tweet on October 20, 2019. дальше »
2019-10-22 23:00 | |
Zcash (ZEC) Warns Users Against a Malicious Copy Of The Native ZecWallet In GitHub
The Zcash Community is among the latest projects within the crypto industry to be targeted by scammers creating duplicate wallets. Officials from Zcash made it public that they had detected a malicious software operating as a ZecWallet. дальше »
2019-10-21 20:28 | |
Tor Browser Malware May Have Stolen Users’ Bitcoin For Years
Researchers have identified malware associated with an unofficial version of the Tor Browser. Evidence suggests that the covert software has been tricking users into sending Bitcoin to addresses under the control of scammers. дальше »
2019-10-19 23:00 | |
Monero-Mining Malware Found Embedded in Audio Files
Cybercrime is getting more profitable and, with this increased profitability, the need has arisen for hackers to become more innovative in their operations. As it is with the legitimate business scene, criminals are now thinking out of the box to stay ahead of the curve. дальше »
2019-10-18 21:35 | |
New cryptomining malware uses WAV audio files to conceal its tracks
A new campaign discovered by security researchers shows that cybercriminals are hiding malware inside WAV audio files. This technique of obfuscating malicious code in plain sight — a method called steganography — was uncovered by BlackBerry’s cybersecurity subsidiary Cylance. дальше »
2019-10-17 14:00 | |
New Crypto-Jacking Malware ‘Graboid’ Infects Thousands of Computers to Mine Monero (XMR)
Palo Alto Networks’ Unit 42 researchers discovered a new crypto-jacking malware that infected over 2000 victim's computers. The malware infects unsuspecting users’ computers to mine Monero (XMR), a privacy-based cryptocurrency. дальше »
2019-10-17 00:37 | |
Cryptojacking worm uses Docker to infect over 2,000 systems to secretly mine Monero
Researchers have uncovered the first instance case of a cryptojacking worm that propagates via malicious Docker images, according to Palo Alto Networks’ threat intelligence team Unit 42. Dubbed “Graboid,” the worm infects compromised hosts with malware that covertly abuses the systems to mine privacy-focused cryptocurrency Monero before randomly spreading to the next target. дальше »
2019-10-16 16:03 | |
‘Save Yourself’ sextortion campaign targets 27 million victims in their inboxes
A well-established botnet and malware agent is now engaged in a new large-scale sextortion campaign by acting as a spambot to target innocent recipients. According to Check Point Research, the creators of the Phorpiex (aka Trik) botnet added this revenue generation ability to trick victims into transferring more than 11BTC (~$89,370) to the threat actors’ wallets over the course of five months. дальше »
2019-10-16 16:00 | |
New Malware Sheds Light on How Cryptocurrency Exchanges Get Hacked
Ever wondered how cryptocurrency exchanges get hacked? Well, a new malware attempt by a North Korean hacking group might reveal some of what goes into such an attack. The new malware operates under the guise of a client-side trading software called “JTM Trading Software” and appears to be operated by the infamous North Korean Lazarus […] The post New Malware Sheds Light on How Cryptocurrency Exchanges Get Hacked appeared first on BeInCrypto. дальше »
2019-10-16 08:17 | |
North Korean Hackers, Lazurus, Create A New Crypto Scam Malware Targeting MacOS Users
Security analysts have allegedly unearthed another attack emanating from notorious North Korean hacking group known as Lazarus. The new malware is developed as a fake cryptocurrency trading platform and is targeting MacOS users, the Nextweb reports. дальше »
2019-10-14 20:26 | |
Researchers find Bitcoin sextortion malware also mines Monero
Analysts have reportedly discovered the source of the sextortion emails that’ve plagued the internet since last year — the ones that demand Bitcoin or else they’ll leak videos of you masturbating to kinky pornography. дальше »
2019-10-14 18:12 | |
N. Korean Hackers’ New MacOS Malware Hides Behind Fake Crypto Firm
North Korea’s Lazarus APT Group hackers have created another malware targeting macOS crypto users
дальше »2019-10-15 16:43 | |
Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data
Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The findings — disclosed by California-based enterprise security solutions provider Proofpoint US — discovered at least 77 percent of email attacks on the medical sector during the first three months of 2019 involved the use of malicious links. дальше »
2019-10-9 19:00 | |
Sextortion scammers pivot from Bitcoin to Litecoin for better blackmailing
Sextortion phishers are pivoting away from Bitcoin to alternative cryptocurrencies to avoid being caught by email filters, ZDNet reports. In particular, some sextortionists now rely on Litecoin, as major email providers automatically flag suspicious emails that feature Bitcoin wallet addresses. дальше »
2019-10-9 15:11 | |
US Hospitals are Paying into Hackers Ransomware Demands to Remove Ryuk Attacks
A group of hackers is threatening hospitals from all over the world with a malware called Ryuk. Now, some hospitals from the United States have decided to pay up the ransomware to get rid of this problem, the Next Web’s Hard Fork reported. дальше »
2019-10-8 00:46 | |
State-sponsored Chinese hackers have been targeting Southeast Asia since 2013
Researchers have revealed a previously undocumented threat actor of Chinese origin that has run at least six different cyber espionage campaigns in the Southeast Asian region since 2013. The research — disclosed by Palo Alto Networks’ threat intelligence team Unit 42 — linked the attacks to a group (or groups) it called PKPLUG, named after its tactic of delivering PlugX malware inside ZIP files, which are identified with the signature “PK. дальше »
2019-10-4 15:23 | |
Research: $160 Malware Botnet Tries to Steal Crypto From 72,000 Devices
Crypto phishing scam MasterMana reaches 2,000 users weekly: research
дальше »2019-10-4 10:43 | |
Chinese hacking group targets Southeast Asian governments with data-stealing malware
A threat group responsible for a series of malware-based espionage attacks in Singapore and Cambodia has been increasingly targeting the Southeast Asian government sector to steal confidential data, new research indicates. дальше »
2019-10-2 15:08 | |
Обнаружен вирус, подменяющий криптовалютные кошельки с помощью Telegram
Специалисты Juniper Threat Labs обнаружили новое вредоносное ПО, крадущее личные данные пользователей и подменяющее криптовалютные кошельки своими собственными. Функционирует вирус с помощью мессенджера Telegram. дальше »
2019-10-1 16:41 | |
172 malicious apps with 335M+ installs found on Google Play
Google desperately needs to curb the spread of Android malware. In September alone, researchers uncovered a total of 172 infected apps on the Play Store. The worst part? These apps had racked up over 335 million installs by the time they were detected by security experts. дальше »
2019-10-1 14:43 | |
Newly Discovered Spyware Uses Telegram Bots to Steal Cryptocurrency from a Number of Wallets
Jupiter Threat Labs recently released a report about a newly discovered commercial spyware called “Masad Clipper and Stealer.” It uses Telegram bots as its command and control (C2) to phish information from Windows and Android users, along with the capability to steal cryptocurrency from unsuspecting victims, while dumping more malware on their devices. The report […] дальше »
2019-9-28 00:30 | |
Here’s how to fight back against Bitcoin-ransoming malware
Losing your data sucks. It sucks even more when someone uses ransomware to maliciously encrypt your files and demands Bitcoin to ensure its safe return. But don’t worry, because there are things you can do to get one over on the cyberbaddies. дальше »
2019-9-26 13:08 | |
Android users suckered for $100s by basic calculator and QR scanning apps
If all the different types of malware that find a way to sneak into the Google Play Store wasn’t enough, here’s another nasty surprise. A new category of apps called “Fleeceware” has been unearthed on the app distribution platform; these apps were found to abuse the Play Store policies and grossly charge users hundreds of dollars for mundane services like calculators and QR code scanners. дальше »
2019-9-26 09:30 | |
Mobile malware campaign targeting Uyghur Muslims impacted Tibetans too
The mobile malware campaign targeting the Uyghur Muslim minority in China was also directed at senior members of Tibetan groups, according to new research. The details — disclosed by University of Toronto’s Citizen Lab and TechCrunch — reveal that the targets were sent specifically tailored malicious web links over WhatsApp, which, when opened, exploited browser vulnerabilities on iOS and Android devices to install spyware, and surreptitiously stole private and sensitive information. дальше »
2019-9-25 11:36 | |
This map connects Russia’s deadly malware to the espionage groups behind them
Notorious threat actors like Potao Express, BlackEnergy and Turla account for as many as 79 unique malware families that have been used to infiltrate European government and military computers and target “high-value” entities across Ukraine, Russia, Georgia, and Belarus for information harvesting. дальше »
2019-9-25 16:02 | |
2 malware-infected photo apps with 1.5M+ downloads removed from Google Play
Google has removed two malicious apps with a combined total of over 1. 5 million downloads after they were caught serving adware. The apps in question — Sun Pro Beauty Camera and Funny Sweet Beauty Selfie Camera — were also found to have “more advanced functionality than your average adware,” according to researchers at Wandera. дальше »
2019-9-23 09:00 | |
Hardcore Wallet Security: 5 More Ways To Keep Hackers’ Paws Off Your Crypto
Hardware wallets are usually considered the safest way to store Bitcoin and other cryptocurrencies. These are dedicated devices that can sign transactions without exposing the underlying private key. дальше »
2019-9-22 19:26 | |
Hardcore Wallet Security: 5 More Ways To Keep Hackers’s Paws Off Your Crypto
Hardware wallets are usually considered the safest way to store Bitcoin and other cryptocurrencies. These are dedicated devices that can sign transactions without exposing the underlying private key. дальше »
2019-9-21 19:26 | |
VPN apps with 500M+ installs caught serving disruptive ads to Android users
Google Play Store has a malware problem. And it doesn’t seem to go away despite the company’s best efforts to rein in sketchy apps. In a yet another instance of Android adware, New Zealand-based independent security researcher Andy Michael found four Android VPN apps with cumulative downloads of over 500 million that not only serve ads while running the background, but are also placed outside the apps, including the home screen. дальше »
2019-9-20 14:53 | |
Trojan Virus Discovered That Steals Password Data from Crypto Wallets
Cybercriminals have launched a new malware conceived to steal data from crypto wallets. ThreatLabZ, a Zscaler team of security experts, has identified the malware as a RAT (Remote Access Trojan), which they named InnfiRAT. дальше »
2019-9-19 20:00 | |