Remove 2014 Remove Malware Remove Social Engineering
article thumbnail

Hackers Exploit Zoom's Remote Control Feature in Cryptocurrency Heists

SecureWorld News

Once control is granted, the attacker can secretly install malware, including infostealers and remote access trojans (RATs), onto the victim's machine. The malware then exfiltrates sensitive data, including cryptocurrency wallet credentials, personal information, and private keys. billion hack of the Bybit exchange in February 2025.

article thumbnail

U.S. Indicts North Korean Hackers in Theft of $200 Million

Krebs on Security

In reality, prosecutors say, the programs were malware or downloaded malware after the applications were installed. “ Hidden Cobra ” is the collective handle assigned to the hackers behind the AppleJeus malware. billion from banks and other victims worldwide.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Coronavirus-themed malspam campaign delivers FormBook Malware

Security Affairs

Experts uncovered a new Coronavirus (COVID-19 ) -themed campaign that is distributing a malware downloader that delivers the FormBook information-stealing Trojan. Experts at MalwareHunterTeam uncovered a new malspam campaign exploiting the fear in the Coronavirus (COVID-19) to deliver malware. states the analysis published by FireEye.

Malware 145
article thumbnail

Russia-Linked Turla APT uses new malware in watering hole attacks

Security Affairs

The Russia-linked APT group Turla employed two new pieces of malware in attacks launched over a period of roughly two months in the fall of 2019. The Russia-linked APT group Turla employed two new pieces of malware in attacks launched over a period of roughly two months in the fall of 2019. Kill (uninstall) the malware. .

Malware 145
article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Vulnerabilities and Malware Primarily includes severe and exploited vulnerabilities in devices or software used by end users (ex: a major router firmware flaw). Malware campaigns covered generally target/affect the end user. Successful exploitation requires social engineering users into manipulating a specially crafted file.

article thumbnail

Crooks spread malware via pirated movies during COVID-19 outbreak

Security Affairs

Microsoft warns of a spike in malware spreading via pirate streaming services and movie piracy sites during the COVID-19 pandemic. Crooks are attempting to take advantage of COVID-19 pandemic spreading malware via pirate streaming services and movie piracy sites during the COVID-19 outbreak, Microsoft warns. . Pierluigi Paganini.

Malware 126
article thumbnail

Which was the most common threat to macOS devices in 2019? Shlayer malware

Security Affairs

Malware authors continue to show interest in macOS devices, Kaspersky experts confirmed that the Shlayer malware has been the most common threat to the macOS platform. Security experts from Kaspersky Lab revealed that the Shlayer malware was the most widespread macOS threat in 2019. up to 10.14.3. up to 10.14.3. Cimpli, AdWare.

Adware 109