Masslogger Swipes Microsoft Outlook, Google Chrome Credentials
According to researchers, Cybercriminals are targeting Windows users with a new and improved variant of the Masslogger Trojan. The malicious software is spyware that is designed to steal credentials from popular applications such as Microsoft Outlook, Google Chrome, and other messenger accounts. Researchers allegedly uncovered the campaign in mid-January, finding
Various Malware Lurks in Discord App to Target Gamers
Zscaler ThreatLabZ, a cybersecurity research firm, found that attackers have been spamming emails and legitimate-looking links into gaming software, with an end goal of dropping the Epsilon ransomware on gamers’ systems. Other malicious applications being utilized in the attacks are the XMRig crypto miner and token stealers. A rise in
Agent Tesla Upgrades with New Delivery & Evasion Tactics
Agent Tesla, a remote access Trojan, has been upgraded to include new evasion tactics as well as the ability to target more applications for credential theft, updated communication tactics, and new techniques for surpassing endpoint defense. The new version targets Microsoft Anti-Malware Software Interface as a means to bypass endpoint
Emotet Tops Malware Charts in December After Reboot
The Emotet Trojan, after undergoing a makeover, is back at the top of malware charts, according to Check Point’s Global Threat Index for December 2020. Emotet was re-designed to boast more evasive strategies that prevent detection. The malware was in fifth place in the Global Threat Index in November but
This ‘off the shelf’ Tor backdoor malware is now a firm favorite with ransomware operators
On Thursday, Sophos Labs’ Sivagnanm Gn and Sean Gallagher, two cybersecurity researchers, revealed detailed information on malware that has become increasingly popular over the past several months, called SystemBC. SystemBC is a remote access trojan (RAT) that is advertised across dark web forums and has the capability to abuse Tor
Your email threads are now being hijacked by the QBot Trojan
Check Point researchers published a report detailing an ongoing campaign involving the QBot Trojan. Its operators have been targeting legitimate email threats to steal credentials and financial data through injecting the prolific malware by leveraging loopholes in the Microsoft Outlook software. Outlook is reportedly susceptible to a module that can
IcedID Trojan Rebooted with New Evasive Tactics
Security researchers have found that the IcedID Trojan has been redesigned to include new techniques in its attacks, including password-protected attachment, keyword obfuscation, and minimalist macro code. The updates were uncovered after a new phishing campaign launched recently that leveraged the malware. Paul Kimayong recently released a report on the
Mac Cryptocurrency Traders Targeted by Trojanized Apps
According to security experts, four trojanized cryptocurrency trading apps have been distributing malware that targets cryptocurrency wallets and collects data from Mac users’ browsing habits. Mac users are the primary victim of the malicious apps, which drain victims’ cryptocurrency wallets after download. The fake applications are called Cointrazer, Cupatrade, Licatrade,
Purple Fox Exploit Kit Adds Two Microsoft Vulnerabilities
Security company Proofpoint has disclosed two new Microsoft exploits that have been coded into Purple Fox, which is an exploit kit that has evolved drastically over the past year. The new updates show that cybercriminals are investing in infection tools and putting time and energy into increasing their capabilities to
FBI Expects Increased Targeting of Mobile Banking Applications
The FBI’s Internet Crime Complaint Center released an alert earlier this week warning Americans that threat actors will likely increasingly target mobile banking applications as they rise in popularity. According to the alert, mobile banking application use went up by 50% since the beginning of this year, drawing the attention