New version of IcedID Trojan uses steganographic payloads

Credit to Author: Threat Intelligence Team| Date: Tue, 03 Dec 2019 18:06:13 +0000

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Categories:

Tags:

(Read more…)

The post New version of IcedID Trojan uses steganographic payloads appeared first on Malwarebytes Labs.

Read more

IM RAT spy tool seller raided, busted, kicked offline

Credit to Author: Lisa Vaas| Date: Tue, 03 Dec 2019 11:39:47 +0000

The spyware gave complete control of victimized computers, sold for as little as$25, and was bought by 14,500 hackers worldwide.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/C9-5zyZFzdY” height=”1″ width=”1″ alt=””/>

Read more

Fake Android apps uploaded to Play store by notorious Sandworm hackers

Credit to Author: John E Dunn| Date: Mon, 02 Dec 2019 11:23:14 +0000

The Russian ‘Sandworm’ hacking group has been caught repeatedly uploading fake and modified Android apps to Google’s Play Store.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/4Dunl7ID7xQ” height=”1″ width=”1″ alt=””/>

Read more

National Veterinary Associates catches dose of ransomware

Credit to Author: Danny Bradbury| Date: Tue, 26 Nov 2019 11:16:10 +0000

Ransomware attacks don’t discriminate – and are just as happy targeting those with four legs as those with two.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ph3qbePJfZk” height=”1″ width=”1″ alt=””/>

Read more

Hacker gets 4 years in jail for NeverQuest banking malware

Credit to Author: Lisa Vaas| Date: Mon, 25 Nov 2019 12:26:05 +0000

The NeverQuest Trojan has been used by cybermuggers to try to weasel millions of dollars out of victims’ bank accounts.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wzl5484w02Q” height=”1″ width=”1″ alt=””/>

Read more

Throwback Thursday: See if you can wriggle out of this one

Credit to Author: Sharky| Date: Thu, 21 Nov 2019 06:00:00 -0800

It’s several years ago during a major virus outbreak — if you know your history of computer viruses, you can narrow it down — and a user at a remote site calls this pilot fish to complain that her computer won’t let her get any work done.

“I asked her if she had called the local technician — who worked for me — and she replied that she had called him numerous times but he had not picked up his phone,” says fish. “I told her I would take care of it.”

Fish calls his tech, who says he has spoken to the user each time she called and explained to her that he’ll help her as soon as he can, but he’s finishing work in another area.

That satisfies fish, who goes back to his own work. And soon he gets a message from his tech, sent from the irate user’s email account, reporting that the tech checked the user’s PC, found a virus and removed it, and updated the PC’s virus definitions. Case closed.

To read this article in full, please click here

Read more