6th April 2017 By Tara Seals Movie piracy is alive and well—as are the bad actors that look to prey on the pirates. ESET has uncovered a new ecosystem for the Sathurbot backdoor Trojan, consisting of more than 20,000 infected computers. This iteration has been active since at least June 2016, and is… Continue reading Sprawling Sathurbot Takes Aim at WordPress, Movie Pirates
Category: Anti-malware
Auto Added by WPeMatico
PLCs From Several Vendors Vulnerable to Replay Attacks
By Eduard Kovacs on April 06, 2017 Programmable logic controllers (PLCs) from several major vendors are affected by implementation flaws that can be exploited by attackers to execute arbitrary commands on the vulnerable devices, researchers warned. The vulnerabilities, identified by ICS security firm CRITIFENCE, are related to the Modbus communications protocol, which is often… Continue reading PLCs From Several Vendors Vulnerable to Replay Attacks
Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox
See Also – Tried-and-true Triada supplants Hummingbad as top mobile malware Nothing new to see here! David Bisson | April 6, 2017 An Android spyware family is using the DroidPlugin open-source sandbox to evade detection by anti-virus software installed on infected devices. The offending trojan, which goes by the name Triada,… Continue reading Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox
Diamond Fox – part 2: let’s dive in the code
See also – Diamond Fox – part 1: introduction and unpacking April 6, 2017 by Malwarebytes Labs In a previous post we made an initial analysis of a Diamond Fox bot delivered by the Nebula Exploit Kit (more about the campaign can be found here). We described the way to unpack the protection… Continue reading Diamond Fox – part 2: let’s dive in the code
Microsoft reveals what data Windows 10 collects from you
In an effort to be more transparent, Microsoft revealed more about what data Windows 10 Creators Update will collect from users’ PCs and clarified what the privacy settings mean. By Darlene Storm, Computerworld | Apr 5, 2017 Microsoft has been under fire for its privacy practices since Windows… Continue reading Microsoft reveals what data Windows 10 collects from you
Scottrade Bank data breach exposes 20,000 customer records
60GB MSSQL database contained customer records and other sensitive data By Steve Ragan, Senior Staff Writer, CSO | Apr 5, 2017 Scottrade Bank, a subsidiary of Scottrade Financial Services, Inc., recently secured a MSSQL database containing sensitive information on at least 20,000 customers that was inadvertently left exposed to… Continue reading Scottrade Bank data breach exposes 20,000 customer records
Critical Xen hypervisor flaw endangers virtualized environments
The vulnerability allows attackers with access to a guest OS to read the host’s memory By Lucian Constantin IDG News Service | Apr 5, 2017 A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the… Continue reading Critical Xen hypervisor flaw endangers virtualized environments
Online Trust Alliance merges with Internet Society
Two become one 5 Apr 2017 at 10:03, John Leyden Key internet standards-making body the Internet Society (ISOC) and security and privacy org the Online Trust Alliance (OTA) are merging. The move, announced Wednesday, sees an important standards-driver combining with an org that has guided best practices… Continue reading Online Trust Alliance merges with Internet Society
ClearEnergy ransomware aim to destroy process automation logics in critical infrastructure
April 5, 2017 By Pierluigi Paganini Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new strain of ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controllers… Continue reading ClearEnergy ransomware aim to destroy process automation logics in critical infrastructure
Project Zero uncovers a nasty Wi-Fi chip exploit
4th April 2017 by Kate Conger Google’s Project Zero has been on a roll lately, unveiling sophisticated bugs in Cloudflare, LastPass and now Broadcom, a Wi-Fi chip supplier whose product is found in iPhones, Nexuses and Samsung devices. Apple patched the bug in a security update yesterday… Continue reading Project Zero uncovers a nasty Wi-Fi chip exploit