Viruses & Malware
The king of the castle has a new tormentor.
IBM’s Trusteer researchers have discovered a new configuration of the Citadel malware that attacks certain password managers. The configuration activates key logging when certain processes are running on the infected machine. The targeted processes include Password Safe and KeePass, two open-source password managers. The variant also targets the nexus Personal Security Client used to secure financial transactions and other services that require heightened security.
An app recently available in the Google Play store claimed to be a download for wallpapers, videos and music, but in reality, it was a SMS trojan app.
The package name “com.FREE_APPS_435.android” tricked victims by getting them to allow the app to access their SMS messages, according to a Malwarebytes blog post. If a user clicked through the app's Google Play homepage to the developer's website, they found two banners and links.
Traditional malware infections usually require a file object to be placed on the system which makes it relatively easy for them to be detected and removed.
Code can be injected into the machine via a fake landing page which makes traditional security solutions like white listing ineffective in combating it.
There's a scary new piece of malware that collects call logs, phonebook contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
The malware was first discovered by researchers at Palo Alto Networks who dubbed it WireLurker and said it exhibited behavior that had never been seen before in malicious software targeting Apple's platforms.
Josh Pitts of Leviathan Security Group has uncovered a malicious Tor exit node in Russia. The node wraps Windows executable files inside a second, malicious Windows executable. The wrapping is only attempted on uncompressed Windows PE (Portable Executable) files.