An unusual ransomware named PureLocker by cybersecurity analysts has been targeting enterprise servers. PureLocker is written in PureBasic, which easily targets different platforms as it is transferable between Linux, OS-X, and Windows. Attacks are launched against the targets, holding them hostage until cryptocurrency ransom is paid; often hundreds of thousands
Putin’s Russia has demonstrated a penchant for relying on proxies to provide a degree of deniability while pursuing its military objectives. As noted in Christoph Zürcher’s book The post-Soviet wars: Rebellion, ethnic conflict and nationhood in the Caucasus, Putin’s popularity emerged in large part due to his successful resolution of the conflict with Chechnya, which he achieved by co-opting the Kadyrov warlords. More recently, Putin has relied on not only deniable Russian forces, but also proxies within Ukraine. Still, blunders by Russian private military companies like the Wagner Group and Slavonic Corps in Syria have demonstrated how this deniability can backfire.
A researcher with Akamai has uncovered a highly destructive campaign that is rendering thousands of Internet-of-things (IoT) devices useless by wiping their firmware. The malware used to “brick” IoT devices is a new strain called Silex. While the functionality of targeted devices can technically be restored by reinstalling the firmware,
A researcher with Morphus Labs has uncovered a botnet that is scanning the Internet for Windows machines that have a poorly secured Remote Desktop Protocol (RDP) connection enabled. The botnet, dubbed GoldBrute, tries to obtain access to vulnerable machines by launching brute-forcing and credential stuffing attacks. GoldBrute has already identified
Figures released by Google last week highlight how widespread cybercrime has become. Last year, the company took down 2.3 billion bad ads, 58.8 million of which were phishing ads. 207,000 of the adds were for ticket resellers and over 531,000 for bail bonds. Google stepped up its efforts to fight
A new report by Check Point shows that cryptominers, i.e. malware that hijacks the processing power of infected systems in order to mine cryptocurrency, remained the dominant malware threat in February. As was true throughout 2018, the number one threat was Coinhive, a cryptomining software developed for legitimate purposes but
“One company says a group is attempting to extort it with the threat of spreading a wave of fake, negative reviews and complaints across Instagram and Twitter. ‘We are experts in destroying personal or company reputation online,’ the group, calling itself STD Company, wrote to its targets, according to a
In describing the intelligence value to be derived in analyzing cryptocurrency transactions, security professional John Bambenek shared with the AUSCERT security conference his experience finding a cybercriminal’s private wallet key accidentally uploaded to VirusTotal. “On a whim, Bambenek searched Virus Total’s online repository of malware and other files for those