As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge change. The exploit kit traffic is just a small proportion of what it previously was dropping a …
Read More »EasyDoc malware infects Macs and routes through TOR
Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc Converter.app, claims to be a file converter but fails to do its advertised features. Rather, it drops advanced malware (Backdoor.MAC.Eleanor) …
Read More »Healthcare sector hit by advanced worms, infects MRI and x-ray machines
MRI, x-ray, and an oncology machines were all found containing malware with code to install backdoors on other connected systems for the purpose of lifting data off the machines. Security experts at TrapX Security are referring to these techniques as MEDJACKing. In 2015, a report but …
Read More »New FastPOS malware targeting Point-of-Sale systems
Experts have disclosed a new category of malware, labeled “FastPOS,” that has the ability to quickly extract stolen credit card details. Different from most POS malware, FastPOS concentrates on copying harvested data as quickly as possible to its command and control (C&C) servers, in comparison to collecting …
Read More »Angler Exploit Kit remains undetected
Angler exploit kit first showed up in late 2013, and ever since then has dramatically gained popularity on underground forums. Its ambitious tactics for avoiding detection by security applications have led to many updates and improvements of components it utilizes (HTML, JavaScript, Flash, Silverlight, Java and more). …
Read More »