article thumbnail

Blister malware using code signing certificates to evade anti malware detection

CyberSecurity Insiders

As some hackers have developed a malware that uses code signing certificates to avoid detection by security defenses and has the tendency to download payloads onto a compromised system.

Malware 124
article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

Zoom’s security bulletin listed the following affected products: Zoom Desktop Client for Windows before version 5.16.5 Users can download it manually, by navigating to Zoom’s download page , or automatically, by opting to download the latest version when Zoom prompts them to do so.

VPN 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

Security Boulevard

The analyzed campaign employs a series of custom-developed modules, including: Downloader Module: Downloads further stages, evades sandboxes through system reboots, and maintains persistence using LNK files. Figure 4 - Malicious ZIP archive downloaded from the Amazon EC2 instance. services/upthon. exe" resides.

Malware 105
article thumbnail

RansomEXX ransomware hit computer manufacturer and distributor GIGABYTE

Security Affairs

The company confirmed the security breach and launched an investigation into the incident with the help of external security experts. “GIGABYTE, a major manufacturer of motherboards and graphics cards, confirmed that some servers were attacked by hackers today, and the security defense was activated as soon as possible.

article thumbnail

How to Prevent Malware: 15 Best Practices for Malware Prevention

eSecurity Planet

Paranoia is a very good thing with web security in general. Be Careful with Downloads Downloads are one of the surest ways to introduce malware into your system. As with phishing emails, the best defense is a well-trained, alert user. Also read: 19 Different Types of Malware Attacks: Examples & Defenses 3.

Malware 120
article thumbnail

VulnRecap 1/22/24 – Watch Chrome, Ivanti, Citrix Issues

eSecurity Planet

The fix: Users need to download the new public commit signing key from GitHub. According to Jamf, if the malware is detonated, it’ll download onto the victim’s device and execute background payload processes. The authenticated user must also be logged into an account on an instance of GHES.

article thumbnail

How Steganography Allows Attackers to Evade Detection

eSecurity Planet

While steganography is often considered something of a joke in capture-the-flag (CTF) events and other cybersecurity defense activities, it can happen in real attacks and can take security defenses by surprise simply by using another layer of cover. malware or command-and-control instructions). LokiBot is a striking example.