Torify and analyze traffic for your VM

Credit to Author: Jérôme Boursier| Date: Thu, 09 Mar 2017 18:00:58 +0000

Several solutions to isolate and analyze a VM network traffic for malware analysis purpose exist. Whonix, Tor and Virtual makes this process painless and efficient.

Categories:

Tags:

(Read more…)

The post Torify and analyze traffic for your VM appeared first on Malwarebytes Labs.

Read more

Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report

Credit to Author: Malwarebytes Labs| Date: Mon, 06 Mar 2017 18:04:31 +0000

In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report appeared first on Malwarebytes Labs.

Read more

Free antivirus coupon leads to tech support scam

Credit to Author: Jérôme Segura| Date: Fri, 03 Mar 2017 16:00:07 +0000

Yet another trick to watch out for with this free antivirus offer that misleads you into calling tech support scammers.

Categories:

Tags:

(Read more…)

The post Free antivirus coupon leads to tech support scam appeared first on Malwarebytes Labs.

Read more

New Neutrino Bot comes in a protective loader

Credit to Author: Malwarebytes Labs| Date: Mon, 27 Feb 2017 19:30:31 +0000

We take another look at the Neutrino bot, known for its diverse feature set ranging from snooping on victims to performing DDos attacks. This latest version includes a hardened protective layer aimed at defeating sandboxes and hiding the bot from discovery.

Categories:

Tags:

(Read more…)

The post New Neutrino Bot comes in a protective loader appeared first on Malwarebytes Labs.

Read more

Mac ransomware on piracy sites

Credit to Author: Thomas Reed| Date: Thu, 23 Feb 2017 16:00:31 +0000

February has been a relatively busy month in the world of Mac malware, and now it has gotten busier with the appearance of the second piece of ransomware ever to affect macOS.

Categories:

Tags:

(Read more…)

Read more

Rogue Chrome extension pushes tech support scam

Credit to Author: Jérôme Segura| Date: Tue, 21 Feb 2017 17:22:42 +0000

Google Chrome may be one of the more secure browsers but an increasing number of malicious extensions are being forced onto users. The one we analyze can hide itself and receive commands from a remote server in order to hijack the browser with incessant offers, fraud and even tech support scams.

Categories:

Tags:

(Read more…)

Read more