Seamless campaign serves RIG EK via Punycode

Credit to Author: Jérôme Segura| Date: Mon, 04 Dec 2017 22:48:49 +0000

The most prolific gate to the RIG exploit kit is coming in a different flavor. The Seamless campaign is now using a domain name with foreign characters translated by Punycode.

Categories:

Tags:

(Read more…)

The post Seamless campaign serves RIG EK via Punycode appeared first on Malwarebytes Labs.

Read more

Terror exploit kit goes HTTPS all the way

Credit to Author: Jérôme Segura| Date: Mon, 27 Nov 2017 20:00:34 +0000

A look at some techniques used by the Terror exploit kit to evade traffic-based detection.

Categories:

Tags:

(Read more…)

The post Terror exploit kit goes HTTPS all the way appeared first on Malwarebytes Labs.

Read more

Disdain exploit kit and a side of social engineering deliver Neutrino Bot

Credit to Author: Jérôme Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.

Categories:

Tags:

(Read more…)

The post Disdain exploit kit and a side of social engineering deliver Neutrino Bot appeared first on Malwarebytes Labs.

Read more

Disdain exploit kit served with a side of social engineering

Credit to Author: Jérôme Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.

Categories:

Tags:

(Read more…)

The post Disdain exploit kit served with a side of social engineering appeared first on Malwarebytes Labs.

Read more

A look into the global drive-by cryptocurrency mining phenomenon

Credit to Author: Jérôme Segura| Date: Tue, 07 Nov 2017 13:00:12 +0000

As drive-by downloads slow down, drive-by cryptocurrency mining emerges as the latest annoyance that hijacks our PCs’ CPU.

Categories:

Tags:

(Read more…)

The post A look into the global drive-by cryptocurrency mining phenomenon appeared first on Malwarebytes Labs.

Read more

Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable

Credit to Author: Jean Taggart| Date: Tue, 17 Oct 2017 16:44:37 +0000

A serious flaw in the wireless protocol that secures all modern protected Wi-Fi networks has been discovered. If your device supports Wi-Fi, it is most likely affected. This feasible attack, dubbed KRACK, could abuse design or implementation flaws in the Wi-Fi standard, not some specific hardware. 

Categories:

Tags:

(Read more…)

The post Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable appeared first on Malwarebytes Labs.

Read more

Decoy Microsoft Word document delivers malware through a RAT

Credit to Author: Jérôme Segura| Date: Fri, 13 Oct 2017 15:00:41 +0000

A Remote Administration Tool (RAT) is delivered via an unusual route: a benign-looking Microsoft Word document with an ulterior motive.

Categories:

Tags:

(Read more…)

The post Decoy Microsoft Word document delivers malware through a RAT appeared first on Malwarebytes Labs.

Read more

BlueBorne – Bluetooth’s airborne influenza

Credit to Author: Nathan Collier| Date: Fri, 29 Sep 2017 15:00:11 +0000

Armis Labs has discovered a new attack vector that targets any device that has Bluetooth capability.

Categories:

Tags:

(Read more…)

The post BlueBorne – Bluetooth’s airborne influenza appeared first on Malwarebytes Labs.

Read more