Home Malware

Malware

Threat Actors Target Aviation Firms Via Spear Phishing Campaign – E Hacking News

 Fortinet researchers discovered a spear-phishing campaign targeting the aviation industry with malicious download links that distribute the AsyncRAT with a well-crafted message. AsyncRAT,...

Colombia Catches Hacker Wanted in the U.S. for ‘Gozi’ Virus

Colombian officials say they have arrested a Romanian hacker who is wanted in the U.S. for distributing a virus that infected more than...

Microsoft Admits of Signing a Rootkit Malware – E Hacking News

 Earlier this month, Microsoft signed a driver called Netfilter that turned out to be a malicious network filter rootkit. Krasten Hahn, a G...

New Security Measures Announced for Google Play Developer Accounts

Google on Monday announced new security measures for developer accounts on Google Play, meant to ensure that each account is created by a...

Malvuln Project Catalogues 260 Vulnerabilities Found in Malware

Malvuln has catalogued hundreds of vulnerabilities discovered in malware, and while the project has yet to actually prove useful to anyone, its developer...

Google now requires app developers to verify their address and use 2FA

Google on Monday announced new measures for the Play Store, including requiring developer accounts to turn on 2-Step Verification (2SV), provide an address,...

Threat Actor Abuses Microsoft’s WHCP to Sign Malicious Drivers

Microsoft is investigating an incident where a threat actor submitted malicious drivers for certification through the Windows Hardware Compatibility Program. Built by a third-party,...

Like Their Adversaries, Threat Hunters Need Anonymity

The pivot to remote work forced by the Covid-19 outbreak was sudden, but security stepped up to the challenge. According (ISC)², the association...

Microsoft: SolarWinds Hackers Continue to Target IT Companies

Microsoft says it has observed new activity associated with Nobelium, the Russia-linked threat actor that compromised IT management and monitoring solutions provider SolarWinds. The...

Hackers are Remotely Erasing Western Digital Hard Drives – E Hacking News

 The whole goal of using a network-attached storage device is to have a hard drive where you can back up vital data and...

This Malware Generated $2 Million After Abusing 222,000 Windows Systems – E Hacking News

 Avast researchers published a report on Thursday regarding the discovery of a cryptocurrency mining malware that abuses Windows Safe mode and has likely...

A New GoLang Trojan ChaChi Used in Attacks Against US Schools – E Hacking News

  A new Trojan written in the Go programming language has shifted its focus from government agencies to schools in the United States. The malware,...

Most Read

‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library

Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close...

Popular NPM Package Hijacked to Publish Crypto-mining Malware

The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over...