Yet another flaw in Apple’s “iamroot” bug fix

Credit to Author: Thomas Reed| Date: Mon, 04 Dec 2017 17:05:12 +0000

Flaws in Apple’s response to the “iamroot” vulnerability show that some systems can remain vulnerable even after applying the patch.

Categories:

Tags:

(Read more…)

The post Yet another flaw in Apple’s “iamroot” bug fix appeared first on Malwarebytes Labs.

Read more

Terror exploit kit goes HTTPS all the way

Credit to Author: Jérôme Segura| Date: Mon, 27 Nov 2017 20:00:34 +0000

A look at some techniques used by the Terror exploit kit to evade traffic-based detection.

Categories:

Tags:

(Read more…)

The post Terror exploit kit goes HTTPS all the way appeared first on Malwarebytes Labs.

Read more

Terdot Trojan likes social media

Credit to Author: Pieter Arntz| Date: Wed, 22 Nov 2017 18:47:17 +0000

The Terdot Trojan is a banker, but it loves to steal your social networks credentials as well.

Categories:

Tags:

(Read more…)

The post Terdot Trojan likes social media appeared first on Malwarebytes Labs.

Read more

OSX.Proton spreading through fake Symantec blog

Credit to Author: Thomas Reed| Date: Mon, 20 Nov 2017 18:29:16 +0000

A new variant of the OSX.Proton malware is being promoted via a fake Symantec blog site.

Categories:

Tags:

(Read more…)

The post OSX.Proton spreading through fake Symantec blog appeared first on Malwarebytes Labs.

Read more

Augmented Reality games and real-world trolling

Credit to Author: Christopher Boyd| Date: Mon, 13 Nov 2017 19:46:42 +0000

The popular Augmented Reality game Ingress has had some issues with third-party tools causing headaches for players. Could your love for a mobile game result in real-world problems? Read on and find out.

Categories:

Tags:

(Read more…)

The post Augmented Reality games and real-world trolling appeared first on Malwarebytes Labs.

Read more

Disdain exploit kit and a side of social engineering deliver Neutrino Bot

Credit to Author: Jérôme Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.

Categories:

Tags:

(Read more…)

The post Disdain exploit kit and a side of social engineering deliver Neutrino Bot appeared first on Malwarebytes Labs.

Read more

Disdain exploit kit served with a side of social engineering

Credit to Author: Jérôme Segura| Date: Fri, 10 Nov 2017 00:23:26 +0000

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.

Categories:

Tags:

(Read more…)

The post Disdain exploit kit served with a side of social engineering appeared first on Malwarebytes Labs.

Read more

Analyzing malware by API calls

Credit to Author: Pieter Arntz| Date: Tue, 31 Oct 2017 18:59:11 +0000

As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.

Categories:

Tags:

(Read more…)

The post Analyzing malware by API calls appeared first on Malwarebytes Labs.

Read more