Quantcast
Channel: Seculert Blog on Breach Detection » Trojan
Browsing latest articles
Browse All 11 View Live

Image may be NSFW.
Clik here to view.

Citadel – An Open-Source Malware Project

A few weeks ago, Brian Krebs reported on Citadel, a new variant of the Zeus Trojan. Citadel creators decided to provide this new variant in a Software-as-a-Service (SaaS) model, which seems to be a...

View Article


Image may be NSFW.
Clik here to view.

Spear Phishing Campaign uses Google Docs to Hack Enterprises

As reported by V3.co.uk, FireEye researchers have identified a spear phishing campaign that is connecting advanced malware to command and control (C&C) servers via the legitimate SSL provided by...

View Article


Image may be NSFW.
Clik here to view.

Comfoo Trojan Used in 2010 RSA Attack is Back in Action – Big Time

A new report from Dell Secureworks is shedding light on the Comfoo Trojan used in the massive 2010 APT attack at RSA — and the news isn’t good. After penetrating the Comfoo’s command and control...

View Article

Image may be NSFW.
Clik here to view.

Dropbox Spear Phishing Campaign Deploys New Zeus Trojan Variant

We recently wrote about a group of Chinese hackers using Dropbox and WordPress to carry out sophisticated APT attacks. It worked by tricking employees into downloading an official-looking file that...

View Article

Image may be NSFW.
Clik here to view.

New Malware Variant Attacking Enterprises Using SAP

As reported by PCWorld, enterprises that use SAP client software are in the cross-hairs of a new malware variant that researchers believe is the first created by adversaries, rather than by researchers...

View Article


Image may be NSFW.
Clik here to view.

DGA.Changer Malware: Changing Seed to Evade Sandbox

On October 24, adversaries hacked php.net and deployed an exploit kit, which served five different malware types. While the attack received extensive coverage, little is known about the malware and the...

View Article

Image may be NSFW.
Clik here to view.

Ransomware Trojan Delivered via Fake Dropbox Email

Cyber attacks on enterprises via Dropbox aren’t new – in fact, we were warning about them last year. However, bad actors routinely adjust their tactics, and this latest ransomware variation is a doozy....

View Article

Image may be NSFW.
Clik here to view.

Tiny Tinba Trojan Could Pose Big Threat

In July 2014, the original source code of Tinba was made public in an underground forum. This leaked version comes with complete documentation and full source code. This follows other source code leaks...

View Article


Image may be NSFW.
Clik here to view.

Malware Exploits Network Security Weaknesses

In its newly-released 2014 Midyear Security Report, Cisco is warning enterprises that, while they still need to focus on plugging high-profile vulnerabilities in their network defense system, they...

View Article


Image may be NSFW.
Clik here to view.

New Dyre Version- Yet Another Malware Evading Sandboxes

Last fall, we posted about the new tricks of the Tinba trojan. Now, the Dyre malware, another trojan has some new tricks of its own. The Dyre Wolf malware campaign made headlines in early April as a...

View Article
Browsing latest articles
Browse All 11 View Live