article thumbnail

Why Malware Crypting Services Deserve More Scrutiny

Krebs on Security

If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good deal of time trying to disguise or “crypt” your malware so that it appears benign to antivirus and security products. In 2010, someone with the username Pepyak on the Russian language affiliate forum GoFuckBiz[.]com

Malware 219
article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

This post is a deep dive on “ Megatraffer ,” a veteran Russian hacker who has practically cornered the underground market for malware focused code-signing certificates since 2015. More recently, it appears Megatraffer has been working with ransomware groups to help improve the stealth of their malware. WHO IS MEGATRAFFER?

Malware 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Giving a Face to the Malware Proxy Service ‘Faceless’

Krebs on Security

For the past seven years, a malware-based proxy service known as “ Faceless ” has sold anonymity to countless cybercriminals. The proxy lookup page inside the malware-based anonymity service Faceless. The password chosen by this user was “ 1232.” Image: spur.us. Image: Darkbeast/Ke-la.com.

Malware 234
article thumbnail

No SOCKS, No Shoes, No Malware Proxy Services!

Krebs on Security

Compounding the problem, several remaining malware-based proxy services have chosen to block new registrations to avoid swamping their networks with a sudden influx of customers. com , a malware-based proxy network that has been in existence since at least 2010. Last week, a seven-year-old proxy service called 911[.]re

Malware 256
article thumbnail

Picus Threat Library Is Updated for Flagpro Malware of BlackTech Group

Security Boulevard

Picus Labs has updated the Picus Threat Library with new attack methods for Flagpro malware of BlackTech. The APT group was first observed in 2010 and they have been active since. Flagpro malware was recently discovered by NTTSecurity and the malware is attributed to BlackTech [1]. BlackTech APT group. Initial Access.

Malware 122
article thumbnail

New malware tied to China targets Linux endpoints and servers

SC Magazine

New malware compiled on Red Hat Enterprise Linux uses a network data encoding scheme based on XOR, creates a backdoor in systems that gives an attacker near full control over infected machines. ( “Linux password file” by Christiaan Colen is licensed under CC BY-SA 2.0 ).

Malware 136
article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

I had a chance to discuss the latter with Ravi Srinivasan, CEO of Tel Aviv-based Votiro which launched in 2010 and has grown to . The attacker managed to insert attack code into a zip file contained in a password-protected email message – one that the banker was expecting to receive from the attorney.