Remove 2014 Remove Architecture Remove Malware
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call data records (CDR). The VoIP platform Linknat VOS2009 and VOS3000 targeted by the malware is used by two China-produced softswitches (software switches). ” reads the analysis published by ESET.

Malware 145
article thumbnail

Crooks leverage Zoom’s popularity in Coronavirus outbreak to serve malware

Security Affairs

com to deliver malware. Prevent zero-day attacks with a holistic, end to end cyber architecture. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Threat actors registered malicious domains like googloclassroom[.]com

Malware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massive increase in XorDDoS Linux malware in last six months

Malwarebytes

XorDDoS, a Linux Trojan known for its modularity and stealth, was first discovered in 2014 by the white hat research group, MalwareMustDie (MMD). Based on a case study in 2015 , Akamai strengthened the theory that the malware may be of Asian origin based on its targets. MMD believed the Linux Trojan originated in China.

Malware 143
article thumbnail

Raccoon Malware, a success case in the cybercrime ecosystem

Security Affairs

Raccoon Malware is a recently discovered infostealer that can extract sensitive data from about 60 applications on a targeted system. Racoon malware , Legion, Mohazo, and Racealer, is an infostealer that recently appeared in the threat landscape that is advertised in hacking forums. ” reads the report published by CyberArk.

article thumbnail

Feedify cloud service architecture compromised by MageCart crime gang

Security Affairs

Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. The post Feedify cloud service architecture compromised by MageCart crime gang appeared first on Security Affairs. Pierluigi Paganini.

article thumbnail

EnemyBot malware adds new exploits to target CMS servers and Android devices

Security Affairs

The botnet targets multiple architectures, including arm, bsd, x64, and x86. Experts pointed out that the malware is being actively developed. Gafgyt is a popular choice for launching large-scale DDoS attacks, it first appeared in the threat landscape in 2014. Upon installing the threat, the bot drops a file in /tmp/.pwned

Malware 145
article thumbnail

Cyberium malware-hosting domain employed in multiple Mirai variants campaigns

Security Affairs

The botnet was linked to a new malware hosting domain that has been serving Mirai variants for several different botnets over the past year. This payload contains the logic to change the execution path to a temporary location, wget a file from a malware hosting page, provide execution permissions, and execute it.”

Malware 140