Citadel – An Open-Source Malware Project
A few weeks ago, Brian Krebs reported on Citadel, a new variant of the Zeus Trojan. Citadel creators decided to provide this new variant in a Software-as-a-Service (SaaS) model, which seems to be a...
View ArticleSpear Phishing Campaign uses Google Docs to Hack Enterprises
As reported by V3.co.uk, FireEye researchers have identified a spear phishing campaign that is connecting advanced malware to command and control (C&C) servers via the legitimate SSL provided by...
View ArticleComfoo Trojan Used in 2010 RSA Attack is Back in Action – Big Time
A new report from Dell Secureworks is shedding light on the Comfoo Trojan used in the massive 2010 APT attack at RSA — and the news isn’t good. After penetrating the Comfoo’s command and control...
View ArticleDropbox Spear Phishing Campaign Deploys New Zeus Trojan Variant
We recently wrote about a group of Chinese hackers using Dropbox and WordPress to carry out sophisticated APT attacks. It worked by tricking employees into downloading an official-looking file that...
View ArticleNew Malware Variant Attacking Enterprises Using SAP
As reported by PCWorld, enterprises that use SAP client software are in the cross-hairs of a new malware variant that researchers believe is the first created by adversaries, rather than by researchers...
View ArticleDGA.Changer Malware: Changing Seed to Evade Sandbox
On October 24, adversaries hacked php.net and deployed an exploit kit, which served five different malware types. While the attack received extensive coverage, little is known about the malware and the...
View ArticleRansomware Trojan Delivered via Fake Dropbox Email
Cyber attacks on enterprises via Dropbox aren’t new – in fact, we were warning about them last year. However, bad actors routinely adjust their tactics, and this latest ransomware variation is a doozy....
View ArticleTiny Tinba Trojan Could Pose Big Threat
In July 2014, the original source code of Tinba was made public in an underground forum. This leaked version comes with complete documentation and full source code. This follows other source code leaks...
View ArticleMalware Exploits Network Security Weaknesses
In its newly-released 2014 Midyear Security Report, Cisco is warning enterprises that, while they still need to focus on plugging high-profile vulnerabilities in their network defense system, they...
View ArticleNew Dyre Version- Yet Another Malware Evading Sandboxes
Last fall, we posted about the new tricks of the Tinba trojan. Now, the Dyre malware, another trojan has some new tricks of its own. The Dyre Wolf malware campaign made headlines in early April as a...
View Article