Articles about Malware

Hacker group Shadow Brokers auctions off NSA malware

nsa-binary

The NSA has (or had...) a collection of malware in its cyber arsenal. It has been stolen by hackers. It is now available to buy.

A group of hackers going by the name of Shadow Brokers claims to have stolen a range of hacking and malware tools from Equation Group's servers -- Equation Group is itself closely linked with the NSA. The group is offering the tools for auction and will sell them to the highest bidder. If bidding reaches one million Bitcoins, however, the group says it will make the tools publicly available to all.

Continue reading

Malware hits 20 major hotels, customer data may be stolen

Hacker laptop

As many as 20 hotels in the US have been hit by malware, and fears are spreading that customer data, including credit card information, was stolen.

According to a Reuters report, hotels under attack include Starwood, Marriott, Hyatt and Intercontinental -- all part of the HEI Hotels & Restaurants.

Continue reading

Kaspersky finds advanced cyber-espionage malware that hid for five years

Malware magnifier

Kaspersky Lab's security researchers have found a new cyber-espionage malware, most likely built by a nation-state to use against other states' organizations.

Dubbed "ProjectSauron", it is "particularly interested" in accessing encrypted communications. The malware hunts such communications down using an "advanced modular cyber-espionage platform", comprised of a number of different and unique tools.

Continue reading

Ransomware makes up half of all malware

Ransomware eye

Ransomware is no longer a quick and easy way for cyber-criminals to get their hands on some money. It is now considered a "permanent fixture on the threat landscape" -- at least according to PhishMe’s Q2 2016 Malware Review.

The security experts’ new report says ransomware now accounts for 50 percent of all malware configurations, meaning it is now a mature business model. It also says it shows no outward signs of diminishing.

Continue reading

New malware campaign avoids detection to target major financial brands

Malware magnifier

Updated versions of the Gozi malware are being used in currently active campaigns targeting global financial brands according to threat intelligence experts buguroo Labs.

Targets of the attack include PayPal, CitiDirect BE, ING Bank, Société Générale, BNP Paribas, and the Bank of Tokyo. It's expected that attacks currently being perfected in Poland, Japan and Spain, will soon be launched in the US and Western Europe.

Continue reading

Beware of Pokemon Go malware in Google Play

pokemon_go

It may be easy to dismiss reports of Android malware as nothing more than fear mongering by clickbait-loving journalists and security companies, but not even apologists can argue with the fact that the threat is real when malware is approved on Google Play.

ESET's security researchers have uncovered a fake lockscreen app, called Pokemon Go Ultimate, which takes advantage of the game's mindblowing popularity to mislead users into installing it ultimately generating revenue by clicking on porn ads.

Continue reading

Stampedo ransomware available for just $39

Money hands coins

A new variant of ransomware has been found for sale on the dark web for an incredibly low price that allows its victims 96 hours to pay a fee.

This new piece of ransomware is called Stampedo and it is available for only $39 which includes a lifetime license. Once it has infected a user’s system, a fee must be paid within the allotted time in order to regain access. If a user fails to pay the fee, Stampedo begins to delete random files on their computer within six hour intervals.

Continue reading

Malware attack targets European energy companies

Cooling towers

The Labs team at malware protection company SentinelOne has discovered a sophisticated malware campaign that's specifically targeting at least one European energy company.

The malware, called SFG, is the mother ship of an earlier malware sample called Furtim, which targets the industrial automation control systems with sophisticated malware and acts as dropper to deliver a payload which could be used to extract data or potentially shut down the energy grid.

Continue reading

90 percent of security events are caused by bots

hacker bot

Bots account for 49 percent of all internet traffic, most of which is from malicious 'bad bots' according to website security company Incapsula.

Of course there are good bots too, such as the crawlers used by major search engines, but according to Incapsula’s figures 90 percent of all security events are caused by bots, and 66 percent of all bot activity is malicious.

Continue reading

Facebook malware infects 10,000 users in two days

facebook_notifications_closeup

A new malware was spotted by security researchers at Kaspersky Lab, targeting Facebook users. According to the researchers’ new report, there have been 10,000 victims in two days.

The malware has two stages: firstly, an unsuspecting victim gets a message from a Facebook friend, saying they had mentioned them in a comment. But when the victim clicks to see the comment, they instead download a bunch of malware, including a Chrome add-on which can take over the victim’s Facebook account, once they log back in.

Continue reading

New macOS malware gives hackers complete access to your files

endpoint security

For security reasons, out of the box macOS is configured to only allow software from the App Store and identified developers to be installed. However, there are times when users may also want to run apps from other sources, in which case it is possible to enable a no holds barred setting. But, along with the extra freedom, it also exponentially increases the risk of running into malware.

You may be inclined to believe that you can stay safe by sticking to known download websites, but that is not always the case. Bitdefender has uncovered a new Mac malware, called Backdoor.Mac.Eleanor, that poses as a document converter on what the security company calls "reputable sites". When installed, it gives hackers complete access to your Mac.

Continue reading

Android malware HummingBad generates $300,000 in monthly revenue

hack money

When we discuss mobile malware we usually look at the technological aspects, specifically how it's designed, how it spreads, what devices it targets, how it affects them after infection, and how it can removed. What we rarely get to talk about is the financial side of things, which in the case of certain types of malware is the primary interest of their creators.

Check Point has published a report on the HummingBad malware campaign, finding that it generates $300,000 a month in fraudulent revenue with a pool of 85 million infected Android devices across the globe at its disposal. In a year attackers are looking at about $3.6 million in revenue, assuming the number of devices does not expand considerably.

Continue reading

AVG announces 6 new tools to free your data from ransomware

Ransomware eye

Ransomware has gone mainstream with several high-profile attacks. It essentially locks your data away and demands money to free it – essentially mob protection money. While some tools have been released to aid frantic people in these times, most versions have gone unfixed.

Now AVG, the free antivirus company, has come out with six new tools designed to fight this affliction. Each is for a different form of this malware.

Continue reading

At least one mobile device in every large enterprise has a malware infection

mobile malware

A new report focusing on malware in the enterprise, finds that large organizations (those with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device.

The report, by mobile threat defense specialist Skycure finds that four percent of all mobile devices have malware installed, regardless of whether they are managed by an enterprise or an individual.

Continue reading

New ransomware targets Office 365 users

Office 365

A new zero-day malware has been discovered in Australia that affects all of Microsoft’s Office 365 products including Word, Excel, PowerPoint and Outlook.

The malware was discovered by the cyber security company Check Point and comes in the form of an invoice sent by email. The attack is designed to catch unsuspecting victims according to security analyst Raymond Schippers who said: "The email sent to Office 365 users via Outlook gives the appearance of an invoice in the form of an Office document. When they go to open it, a message will appear telling people the document was created with a previous version of the software, so they will need to click something to enable the content".

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.