malware

Home / malware

RAUM Tool Allows Malware To Spread In Torrents

Researchers at InfoArmor have uncovered a new tool that allows cybercriminals to package malware into popular torrent files. This new tool is called RAUM and is believed to have been created by an Eastern European crime group by the name of Black Team. The new tool uses a "pay-per-install" model which is only available in [...]

By | September 22nd, 2016|Malware, Security|

New Variant of iSpy Keylogger Distributed Via Spam Email

Security researchers at zScaler have come across a new variant of a commercial keylogger called iSpy. This new variance not only captures victim’s keystrokes, but it can also take screenshots, access their webcam, and steal user data and license keys to popular applications. We call it a commercial keylogger because it actually has a subscription [...]

By | September 22nd, 2016|Malware, Security|

Miner-C Malware Infects Seagate Central NAS Devices

Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. The experts discovered that the new malware leverages network-attached storage (NAS) devices as attack vector. The authors of Mal/Miner-C used the NSIS (Nullsoft Scriptable [...]

By | September 12th, 2016|Malware, Security|

Luabot Malware Turning Linux Based IoT Devices into DDoS Botnet

The IT security researchers at MalwareMustDie have discovered a malware that is capable of infecting Linux-based Internet of Things (IoT) devices and web servers to launch DDoS attacks, called Linux/Luabot. Earlier this week we reported on a similar malware BASHLITE. It is written in the Lua programming language which can infect a system and issue [...]

By | September 9th, 2016|Malware, Security|

BackDoor.TeamViewerENT.1 – TeamViewer Trojan Can Spy On You

There have been some trojans that install malicious versions of the TeamViewer software circulating since 2011. Dr. Web has posted a new iteration of this tojan, calling it BackDoor.TeamViewerENT.1. All iterations of this trojan have been distributed under the name Spy-Agent. The Trojan is used to install additional malware such as keyloggers and form grabbers [...]

By | September 6th, 2016|Malware, Security|

BASHLITE Malware Infects Over 1 Million IoT Devices

Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. Most of the infected IoT devices are digital video recorders (DVRs). What is BASHLITE? Bashlite can brute force a vulnerable device and steal its login credentials and distributes itself on [...]

By | September 2nd, 2016|Malware, Security|

CryptoWall 4.0 Ransomware Updated

The CryptoWall ransomware has been updated to make it more difficult for users to recover their encrypted data. The latest version of CryptoWall, version 4.0, will now alter the file names of data that it has encrypted to prevent victims from determining exactly what has been affected by the program. In addition, ransomware will now [...]

By | November 10th, 2015|Ransomware, Security|
Load More Posts