August 6, 2019 Phishers Impersonate Engineering License Boards to Target Utilities With LookBack Malware 2 min read - Phishers are impersonating engineering license boards in order to target U.S. utility organizations with LookBack malware.
August 6, 2019 SystemBC Malware Using SOCKS5 Proxies to Mask Traffic for Attack Infrastructure 2 min read - A new proxy malware called SystemBC is using SOCKS5 proxies to mask traffic for command-and-control (C&C) infrastructure involved in banking Trojan attacks.
June 18, 2019 Outlaw Threat Group Using Botnet to Distribute Monero Miner, Perl-Based Backdoor 2 min read - The Outlaw threat group is using a botnet to distribute a Monero cryptocurrency miner and a Perl-based backdoor component.
June 18, 2019 InterPlanetary Storm Malware Using IPFS P2P Network to Hide Its Activities 2 min read - A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
June 12, 2019 Latest Mirai Malware Variant Contains 18 Exploits, Focuses on Embedded IoT Devices 2 min read - Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
June 11, 2019 Attack Campaign Exploits CVE-2019-2725, Abuses Certificate Files to Deliver Monero Miner < 1 min read - Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
June 11, 2019 Fileless Attack Campaign Leverages PCASTLE to Distribute XMRig Monero-Mining Malware 2 min read - According to researchers, the fileless attack uses PCASTLE to distribute samples of XMRig, a well-known Monero-mining malware family.
May 21, 2019 Phishing Campaign Delivers Multi-Feature, Open-Source Babylon RAT 2 min read - Researchers spotted a phishing campaign delivering a multi-feature, open-source remote administration tool known as Babylon RAT.
May 15, 2019 Malware Campaign Uses MitM Attack to Distribute Plead Backdoor 2 min read - Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
May 14, 2019 ScarCruft Threat Group Using Malware to Steal Information From Bluetooth Devices 2 min read - An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.