Fileless malware: part deux

Credit to Author: Vasilios Hioureas| Date: Fri, 05 Oct 2018 15:00:00 +0000

In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures.

Categories:

Tags:

(Read more…)

The post Fileless malware: part deux appeared first on Malwarebytes Labs.

Read more

Black Hat USA 2018: ransomware is still the star

Credit to Author: Malwarebytes Labs| Date: Wed, 15 Aug 2018 16:00:02 +0000

A recap of the Malwarebytes’ team experience at the Black Hat conference in Las Vegas, including top trends, topics, and interesting discussions.

Categories:

Tags:

(Read more…)

The post Black Hat USA 2018: ransomware is still the star appeared first on Malwarebytes Labs.

Read more

Osiris dropper found using process doppelgänging

Credit to Author: hasherezade| Date: Thu, 09 Aug 2018 18:52:57 +0000

Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn’t been seen much in the wild since. It was an interesting surprise, then, to discover its use in a dropper of the Osiris banking Trojan. We unpack the code to show how malware authors used this process.

Categories:

Tags:

(Read more…)

The post Osiris dropper found using process doppelgänging appeared first on Malwarebytes Labs.

Read more

Introducing: Malwarebytes Browser Extension

Credit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 17:21:22 +0000

Malwarebytes Browser Extensions (BETA) are available in the official web stores for Chrome and Firefox. Read what they can do for you, and try one, if you haven’t already..

Categories:

Tags:

(Read more…)

The post Introducing: Malwarebytes Browser Extension appeared first on Malwarebytes Labs.

Read more

Mac malware targets cryptomining users

Credit to Author: Thomas Reed| Date: Mon, 02 Jul 2018 18:36:10 +0000

A new Mac malware called OSX.Dummy is being distributed on cryptomining chat groups that, even after being removed, leaves behind remnants for future malware to find.

Categories:

Tags:

(Read more…)

The post Mac malware targets cryptomining users appeared first on Malwarebytes Labs.

Read more

PSA: Users with landlines are more vulnerable to scams

Credit to Author: Jean Taggart| Date: Wed, 06 Jun 2018 15:00:00 +0000

Anyone still using a home phone be warned: having landlines makes you particularly vulnerable to scams. Read on to learn how to keep your landline but stay safe from cyberattacks.

Categories:

Tags:

(Read more…)

The post PSA: Users with landlines are more vulnerable to scams appeared first on Malwarebytes Labs.

Read more

Malwarebytes CrackMe 2: contest summary

Credit to Author: hasherezade| Date: Tue, 22 May 2018 16:00:00 +0000

About three weeks ago, we published our second CrackMe, which has triggered a lot of interest, and many high-quality write-up submissions. In this post, we summarize the contest and comment on the submissions. Whose write-up won? Read on to find out.

Categories:

Tags:

(Read more…)

The post Malwarebytes CrackMe 2: contest summary appeared first on Malwarebytes Labs.

Read more

Vote for Malwarebytes Labs: European Security Blogger Awards 2018

Credit to Author: Christopher Boyd| Date: Mon, 21 May 2018 15:00:00 +0000

Malwarebytes Labs has been nominated for the Best Corporate Security Blog in the 2018 European Security Blogger Awards. Cast your vote for your favorite blog, and spread the word!

Categories:

Tags:

(Read more…)

The post Vote for Malwarebytes Labs: European Security Blogger Awards 2018 appeared first on Malwarebytes Labs.

Read more