Threat actor impersonates Google via fake ad for Authenticator
Only trust official sources they say, but what happens when a Google vetted ad is for a Google product?
Read moreOnly trust official sources they say, but what happens when a Google vetted ad is for a Google product?
Read moreInfostealers like Rhadamanthys continue to be a favorite among malware distributors who leverage search engine ads to lure victims.
Read moreA Ukrainian national that is being accused of operating the Raccoon Infostealer in a Malware-as-a-Service has been extradited to the US.
Read moreCategories: News Tags: erbium Tags: malware Tags: data theft Tags: stealer Tags: wallets Tags: cryptocurrency Tags: browsers Tags: browser Tags: infection Tags: malware as a service We take a look at reports of new data theft malware relying on sold old tricks |
The post Erbium stealer on the hunt for data appeared first on Malwarebytes Labs.
Read moreCredit to Author: Threat Intelligence Team| Date: Tue, 03 Dec 2019 18:06:13 +0000
We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware. Categories: Tags: backdoorbanking Trojanbanking Trojanscredential stealingdownloaderhooking browsersIcedID Trojanmalwaremalware analysisman-in-the-browser attackspasswordsstealerstealer functionalitystealing passwordsstealthy malwaretrickbotTrojans |
The post New version of IcedID Trojan uses steganographic payloads appeared first on Malwarebytes Labs.
Read moreCredit to Author: Albert Zsigovits| Date: Tue, 06 Aug 2019 13:00:15 +0000
A new stealer enjoys a wild ride, but is it a flash in the pan or a long term threat?<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/fFTTXujJgXM” height=”1″ width=”1″ alt=””/>
Read more