Category Archives: Malware Analysis
The nitty-gritty technical details from our malware researchers and developers about all the nastiest malware out there.
Update (Feb 6th): The digital certificates have been revoked by DigiCert. Update (Feb 4th, 3:44 PM): Egnyte has promptly taken down the illicit account following our call. However, digital signature is still in use. In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If […]
UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst Adam Kujawa released a Cyber-Threat Advisory on a fairly new anti-malware product on the web called “Malwarebiter”. This product grabbed our attention because of its similar name to Malwarebytes.
URGENT: New Java Exploit being used to infect Updated Users. ACTION: Disable Java Browser Plugin using: http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ http://krebsonsecurity.com/how-to-unplug-java-from-the-browser/ DETAILS: As of yesterday, a new Java exploit has been developed and released to the cyber-crime community. It is currently in the wild and being used to distribute malware such as the Reveton Ransomware.
The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could be by clicking a link within an email or simply browsing the net, and it happens silently without any user interaction whatsoever. Vulnerabilities are flaws that exist in various programs and that allow someone to […]
Today we are going to be talking about advertising, specifically misleading advertising. Whether it’s on TV or on the internet, in magazines and newspapers, we see misleading advertising all of the time, you see it all of the time, whether you realize it or not. So how do you spot it? Well, that is one […]
While most folks want a new gaming system, TV, or the latest computer gadget, there is another group of people that are looking for something quite different and definitely not your typical in-store purchase. I’m talking about those people buying stolen online ”goods” ranging from credit card numbers and email accounts, to paid adult sites […]
…because some malware is too heinous for clever puns. Ransom software or Ransomware, takes advantage of our constant need for information, communication and entertainment by hijacking our computer systems and demanding payment for returned use. It hides under the masks of government agencies and uses tactics similar to criminal interrogations to guilt the user into […]
The holidays are a time for family, friendship, giving and compassion. They are also a time for cyber criminals to scam people into downloading malware, giving up personal information and even doing non-stop surveys. This blog post will go over a few tricks that you might want to keep an eye out for during this […]
Insecure websites are responsible for most malware infections. In this post I will show you how a typical WordPress site that was poorly configured got hacked, leading unsuspecting visitors to a very bad surprise. If you can browse the underlying structure of a site, it is usually not a good sign. It does not mean […]
In old times, a citadel was a fortress used as the last line of defense. For cyber criminals it is a powerful and state-of-the-art toolkit to both distribute malware and manage infected computers (bots). Citadel is an offspring of the (too) popular Zeus crimekit whose main goal is to steal banking credentials by capturing keystrokes […]
Last week I wrote a blog post on the dangers of ads posing as fake download buttons on various download web sites. Since then I received a lot of feedback from our readers and other security researchers on different tools available to help users avoid these dangers by blocking the ads entirely. Instead of adding […]
In this connected world, time is of the essence. The bad guys are counting on releasing their malicious programs and infecting machines before security companies have time to analyze those samples and provide detection signatures to block the threat. Although antivirus companies have evolved their technologies and can now provide proactive heuristic detections (essentially this […]
Various download sites have been plastering ads all over their pages for years, some of which are just for other types of software and some of them are for services. However, a new trend among these ads has emerged, adding an extra download button where there should not be one. Many users have been falling […]
Instant messaging is not a new concept; in fact, instant messaging software has been around for over 20 years in many different forms. A more popular method of instant messaging these days is done with the use of the software known as Skype. Skype allows for more than just text chatting but also calling a […]
Over the past few weeks Jean-Piere Lesueur, A.K.A. DarkCoderSc, has been developing a new version of the Dark Comet Remote Administration Tool which he is calling “Dark Comet Legacy.” This newer version of the tool includes numerous features that make the tool more user-friendly and appear more legitimate. In addition, DarkCoderSc continues to include notices […]
Many PC users are content to let their hardware and software become outdated and obsolete if only because it still runs, so why update it; or as the old adage goes: “If It Ain’t Broke, Don’t Fix It”. Unlike a refrigerator or a washing machine, outdated computer components leave you vulnerable to attacks by various […]
Browser Malware is a constant problem for all computer users. In addition to being highly intrusive and sometimes difficult to remove, it is one of the most frequently modified types of malware currently in the wild; because of this, Anti-Malware and antivirus products may not detect and remove all new variants of browser infecting malware […]
In war, there are always two sides: the attackers and the defenders. A less focused on group is the researchers and developers. While soldiers are fighting a war on the front lines, scientists and engineers are researching and developing new weapons, defenses and tools; things that give their side an advantage. If one of these […]
A few months ago, I did a series on Phishing, called Phishing 101. In it, I described various ways in which cyber-criminals are trying to steal information by swindling users with fake web sites, social network spamming and even lures in video games. This week I wanted to touch on a method that has been […]
BitCoin is a new-ish form of digital currency. It allows people to perform financial transactions without the need for a bank or central authority and allows for a large amount of privacy. Transactions are currently limited to ones performed online and only by individuals and organizations that accept BitCoin as payment. However, in the next […]