Malware

Malware news, analysis, research, how-to, opinion, and video.

ransomware
android security

double agent

Double Agent attack can turn antivirus into malware

An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.

security hacker privacy

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.

ask

Ask.com serves as a conduit for malware - again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same...

ransomware

Thieves steal Petya ransomware then use it for free

Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get.

petya ransomware logo

Hackers use dangerous Petya ransomware in targeted attacks

A group of attackers has found a way to hijack the Petya ransomware and use it in targeted attacks against companies without the program creators' knowledge.

cyberattack laptop arrows war fight

How to remove ransomware: Use this battle plan to fight back

Ransomware has exploded onto the PC. We'll show you what to do to avoid it, remove it, and—if necessary—even negotiate with its authors.

Security

After CIA leak, Intel Security releases detection tool for EFI rootkits

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.

screen shot 2017 03 09 at 9.58.02 am

Assange: CIA had lost control of its cyberweapon documents

Information about purported CIA cyberattacks was "passed around" among members of the U.S. intelligence community and contractors before it was published by WikiLeaks this week, Julian Assange says.

hacker, hackers, hacking

Leaked docs suggest NSA and CIA behind Equation cyberespionage group

Purported CIA documents leaked Tuesday appear to confirm that the U.S. National Security Agency and one of CIA's own divisions were responsible for the malware tools and operations attributed to a group that security researchers have...

cia

CIA false flag team repurposed Shamoon data wiper, other malware

The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples.

Legislation of privacy security keyboard law legal gavel court ruling

US DOJ drops child porn case to avoid disclosing Tor exploit

The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen after a judge asked the government to disclose the hacking technique it used to gather...

malware attack cyberespionage code hacker

Fileless Powershell malware uses DNS as covert communication channel

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols that are less frequently monitored.

Digital Key encryption

Free decryption tools now available for Dharma ransomware

Researchers have created decryption tools for the Dharma ransomware after someone recently leaked the encryption keys for it.

dl speedport hybrid

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.

Digital Key encryption

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

windows trouble controversy crash problem hacked

What’s up with Windows patching, Microsoft?

A month late? Seriously? It’s both outrageous and unsurprising.

code hacker cyberespionage eye data

Hackers behind bank attack campaign use Russian as decoy

The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Load More