article thumbnail

Fraudulent purchases of digitals certificates through executive impersonation

Security Affairs

The experts discovered that digital certificates are then used to spread malware, mainly adware. The researchers provided evidence that the threat actors sold the purchased certificates to a cybercrime gang that used them to spread malware. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

Adware 80
article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

For at least the past decade, a computer crook variously known as “ Yalishanda ,” “ Downlow ” and “ Stas_vl ” has run one of the most popular “bulletproof” Web hosting services catering to a vast array of phishing sites, cybercrime forums and malware download servers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Malware? Understanding the Basics of Website Malware

SiteLock

Yet in a recent report by Nationwide , only 13% of small business owners said they’d been targeted by a cyberattack, but when they saw specific examples of cybercrime — from phishing to ransomware — that number shot up to 58%. Unfortunately, this rise in cybercrime shows no signs of slowing down.

Malware 98
article thumbnail

MalwareBazaar – welcome to the abuse-ch malware repository

Security Affairs

MalwareBazaar is available for free and only collects known malware samples, the repository will not include adware or potentially unwanted applications (PUA/PUP). No Adware (PUA/PUP). “ ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. SecurityAffairs – MalwareBazaar, cybercrime).

Malware 51
article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

” Microleaves has long been classified by antivirus companies as adware or as a “potentially unwanted program” (PUP), the euphemism that antivirus companies use to describe executable files that get installed with ambiguous consent at best, and are often part of a bundle of software tied to some “free” download.

article thumbnail

IT threat evolution Q2 2021

SecureList

It is complex multi-stage banking malware, which was initially discovered by Doctor Web in 2014. The incident seems to be similar to what happened with CamScanner , when the app’s developer implemented an adware SDK from an unverified source. Initially, it was distributed via spam and exploits kits such as Spelevo and RIG.