Items tagged with Malware

Microsoft is warning Windows users of several new "wormable" exploits similar in style to BlueKeep, two of which are tagged as critical Remote Code Execution (RCE) vulnerabilities. As with BlueKeep, which Microsoft patched a few months ago, the exploits exist within the Remote Desktop Services protocol (formerly known as Terminal Services). These types of exploits are especially worrisome because of their ability to spread through a computer network, once a single machine is infected. "It is important that affected systems are patched as quickly as possible because of the elevated risks associated with wormable vulnerabilities like these, and downloads for these can be found in the Microsoft... Read more...
Security researchers have discovered it is possible to hack a digital SLR camera with Wi-Fi capabilities (fast becoming a common feature in modern DSLR cameras) to install ransomware, thereby hijacking a user's photographs. Just as it happens on a PC, the photos would be encrypted, with the attacker threatening to permanently delete them if a ransom is not paid. "Although most users connect their camera to their PC using a USB cable, newer camera models now support WiFi. This means that what was once a PTP/USB protocol that was accessible only to the USB connected devices, is now also PTP/IP that is accessible to every WiFi-enabled device in close proximity," Check Point says. According to Check... Read more...
We've simply grown accustomed to reading about Android malware on a regular basis, but this latest entry is both intriguing and incredibly dastardly in its deeds. Called Agent Smith, this malware has already infected 25 million Android devices globally with adware. Of those 25 million devices, India has been hit the hardest, taking the brunt of the attacks with 15 million infected devices. Agent Smith, which was first observed in the wild by Check Point Research earlier this year, has been coursing through the Google Play Store. After monitoring the its attack vector, Check Point Research was able to summarize Agent Smith's modus operandi into three parts. First, the malware lurks in... Read more...
182 Android apps have been linked to an adware campaign that has plagued users who download apps from Google Play. Trend Micro detected the adware campaign identified as AndroidOS_HiddenAd.HRXAA and AndroidOS_HiddenAd.GCLA. The adware was hidden inside free-to-download game and camera apps, the majority of which were found on the Google Play Store and had millions of downloads collectively. The adware behind the campaign was disguised as game and camera apps and was discovered in mid-June. Trend Micro says that it generated heuristic patterns that were used to analyze other samples it had detected and were able to deduce that the adware campaign had been active since 2018. All of the apps that... Read more...
This mobile app is definitely something to scream about in more ways than one. The Android game “Scary Granny ZOMBYE Mod: The Horror Game 2019” s stealing users’ Google and Facebook data. The malicious app attempts to siphon both data and money from its users to attackers.  “Scary Granny ZOMBYE Mod: The Horror Game 2019” was a horror game that mimicked another popular Android game “Granny”. Users were tasked with running away from zombies while uncovering extra lives and various weapons. The game was installed over 50,000 times and boasted a 4-star review in the Google Play store before it was removed on June 27th. Image credit: Wandera Security... Read more...
It is often recommended that one of the best ways to avoid malware on mobile devices is to stick with established, reputable app stores. The two big ones are Google's Play Store and Apple's App Store, for Android and iOS, respectively. But is this a foolproof way to avoid malware? The answer is no, according to a two-year study. The study was conducted by researchers from the University of Sydney and Commonwealth Scientific and Industrial Research Organization's Data61. It focused solely on Android apps in the Play Store. The researchers found that counterfeit apps impersonating popular legitimate apps have become so sneaky that even a tech-savvy user might struggle to detect that something is... Read more...
With good intentions, Samsung took to Twitter to remind smart TV owners to scan their televisions for malware, and the Internet reacted about as you would expect. Snarky and indignant replies followed, and of course so did the jokes. And with good reason—after all, Samsung just made one heck of an argument to avoid buying a smart TV. We understand that periodically scanning our PCs for viruses and other malware comes with the territory. To a lesser extent, this can be true of smartphones and tablets, particularly if you venture away from reputable store fronts to grab your apps. But have we really reached a point where we must also scan our TVs? Apparently so, according to Samsung, which... Read more...
An auction for a netbook model from 2008 that is running Windows XP SP3 has fetched more than $1.3 million from its final bid, with the buyer owning quite possibly the most expensive laptop in the world. Why did it sell for so much? It contains half a dozen malware samples that have collectively caused over $95 billion in financial damages. The laptop is appropriately called "The Persistence of Chaos" and, according to the seller, it is an art piece. Guo O Dong, a "contemporary Internet artist whose work critiques modern day extremely-online culture," collaborated with Deep Instinct, a cybersecurity company, which provided the malware. Normally, a Samsung NC10 netbook would be an innocuous piece... Read more...
WhatsApp, a Facebook property, has issued a warning to users of its app and is asking users to upgrade to the latest version of the app. Reports surfaced this week that a company based in Israel has been able to successfully install malware that could listen in on phone calls made via WhatsApp. While WhatsApp confirmed the vulnerability, it didn't name the company that allegedly has the capability of listening in on conversations. WhatsApp is calling for users of its app to update to the latest version of the app and to make sure that their mobile operating system is up to date to protect against targeted exploits designed to compromise information that is stored on the mobile devices. The... Read more...
Where is Neo when you need him? We don't have an answer for that, but Morpheus has been making an appearance on some business PCs, just not in the manner you might think. His mug is part of a message that is delivered by a new ransomware strain called "MegaCortex," which is a misspelled reference to MetaCortex, the faceless software company in The Matrix where Neo worked at. This is not the kind of sequel or reboot that fans might have been hoping for. Security outfit Sophos says it recently saw a "jolt of life" from this ransomware strain, with a spike in the number of attacks around the world, including Canada, France, Ireland, Italy, the Netherlands, and the United States. Those behind MegaCortex... Read more...
A widely used banking Trojan that has been wreaking havoc in the wild for over a decade has developed a new ability. Called Qakbot (or Qbot for short), the Trojan has been found to be using an updated persistence mechanism that can make it more difficult for users to detect and subsequently remove from infected systems, security researchers say. On infected systems, Qakbot attempts to steal login credentials, with the ultimate goal of draining a victim's bank account. It does this by utilizing scheduled tasks to maintain persistence. However, those tasks have been updated to evade detection, making an already pesky piece of malware even more bothersome. "Victims of this malware are typically... Read more...
Even for the more freaky among you, avoiding "The Nasty List" on Instagram is in your best interest. We are not being prudes, by any means—go ahead and let your freak flag fly, if that is what you are all about. However, this so-called list we are referring to is actually a phishing scam that seeing people's accounts get hacked. If you are on Instagram, you may get a direct message saying something to the effect of, "OMG your [sic] actually on here, @TheNastyList_34, your number is 15! its [sic] really messed up." The message will contain a link to the supposed list, but there is no actual list—the URL directs users to a fake Instagram login site, in the hopes of stealing that your... Read more...
Malware is rampant on the Google Play store and is something that Google is trying to get a handle on. Apple has much less of an issue with malware on its App Store because it forces a review process for every app that wants to be distributed on the app store. That doesn't mean that malware and nefarious apps can't make their way through. Mobile security firm Lookout says that a developer has been able to abuse Apple-issued security certificates to bypass the App Store and target Apple devices. The app hid as a carrier assistance app, and once it was installed, it has wide-ranging permissions that allow it to silently capture the compromised device contacts, audio recordings, photos, videos,... Read more...
CT scans are essential tools that help medical practitioners detect various medical conditions. Healthcare providers rely on the accuracy of these technologies, because a misdiagnosis could prove fatal. Unfortunately, this vital technology is vulnerable to hackers. Researchers recently designed malware that can add or take away fake cancerous nodules from CT and MRI scans. Researchers at the University Cyber Security Research Center in Israel developed malware that can modify CT and MRI scans. During their research, they showed radiologists real lung CT scans, 70 of which had been altered. At least three radiologists were fooled nearly every time. A CT Scan of a brain trauma. Image from Rehman... Read more...
Prev 1 2 3 4 5 Next ... Last