Skip to main content

Viruses & Malware

The Sneaky Simple Malware That Hits Millions of Macs

posted onJanuary 26, 2020
by l33tdawg
Credit: Wired

The popular misconception that Macs don’t get viruses has become a lot less popular in recent years, as Apple devices have weathered their fair share of bugs. But it’s still surprising that the most prolific malware on macOS—by one count, affecting one in 10 devices—is so relatively crude.

Greta Thunberg malware is not the present you want this Christmas

posted onDecember 23, 2019
by l33tdawg
Credit: Tech Radar

A global malicious email campaign has been discovered using Swedish teenage environmentalist Greta Thunberg as a hook to lure in unsuspecting victims.

Security researchers at Proofpoint have uncovered a widespread campaign using Miss Thunberg's name to trick users into downloading the notorious Emotet malware botnet.

Dexphot Polymorphic Malware Shows Complexity of Everyday Threats

posted onNovember 27, 2019
by l33tdawg
Credit: Bleeping Computer

Ordinary malware can be a real nuisance to detect due to complex methods that allowed it to slip past security solutions. Dexphot is one such strain that managed to run attack routines on close to 80,000 machines earlier this year.

A Dexphot campaign was first spotted in October 2018 affecting thousands of computers, with attackers upgrading the malware over the following months to a level that left little to analyze.

Microsoft says new Dexphot malware infected more than 80,000 computers

posted onNovember 27, 2019
by l33tdawg
Credit: ZDNet

Microsoft security engineers detailed today a new malware strain that has been infecting Windows computers since October 2018 to hijack their resources to mine cryptocurrency and generate revenue for the attackers.

Named Dexphot, this malware reached its peak in mid-June this year, when its botnet reached almost 80,000 infected computers.

Strange AnteFrigus Ransomware Only Targets Specific Drives

posted onNovember 13, 2019
by l33tdawg
Credit: Bleeping Computer

A new and strange ransomware called AnteFrigus is now being distributed through malvertising that redirects users to the the RIG exploit kit. Unlike other ransomware, AnteFrigus does not target the C: drive, but only other drives commonly associated with removable devices and mapped network drives.

The RIG exploit kit uses malicious scripts hosted on attacker-owned or compromised sites that exploit vulnerabilities in Internet Explorer. If these vulnerabilities can be exploited, it will then install a payload in the visitor's machine without their knowledge.

Two-thirds of all Android antivirus apps are frauds

posted onMarch 14, 2019
by l33tdawg
Credit: Flickr

An organization specialized in testing antivirus products concluded in a report published this week that roughly two-thirds of all Android antivirus apps are a sham and don't work as advertised.

The report, published by Austrian antivirus testing outfit AV-Comparatives, was the result of a grueling testing process that took place in January this year and during which the organization's staff looked at 250 Android antivirus apps available on the official Google Play Store.

The Mysterious Return of Years-Old Chinese Malware

posted onOctober 18, 2018
by l33tdawg
Credit: Wired

In 2013, cybersecurity firm Mandiant published a blockbuster report on a state-sponsored hacking team known as APT1, or Comment Crew. The Chinese group achieved instant infamy, tied to the successful hacks of more than 100 US companies and the exfiltration of hundreds of terabytes of data. They also vanished in the wake of being exposed. Now, years later, researchers from security firm McAfee say they’ve found code based on APT1–associated malware cropping up in a new set of attacks.

Malware Has a New Way to Hide on Your Mac

posted onOctober 3, 2018
by l33tdawg
Credit: Wired

Malware on Apple's MacBook and iMac lines is more prevalent than some users realize; it can even hide in Apple's curated Mac App Store. But the relatively strong defenses of macOS make it challenging for malware authors to persist long-term on Apple computers, even if they can get an initial foothold. Additionally, the avenues available for lurking on macOS are so well known at this point that technicians and malware scanners can flag them quickly. That's why more subtle approaches are significant.