Remove 2015 Remove Antivirus Remove Malware Remove Security Defenses
article thumbnail

Experts link the Black Basta ransomware operation to FIN7 cybercrime gang

Security Affairs

On the other end, FIN7 is a Russian financially motivated group that has been active since at least 2015. It focused on deploying POS malware and launching targeted spear-phishing attacks against organizations worldwide. The threat actors were disabling Windows Defender executing the following scripts: WindowsILUg69ql1.bat

article thumbnail

Experts found DLL Hijacking issues in Avast, AVG, and Avira solutions

Security Affairs

Flaws in Avast, AVG, and Avira Antivirus could be exploited by an attacker to load a malicious DLL file to bypass defenses and escalate privileges. “this vulnerability could have been used in order to achieve self-defense bypass, defense evasion, persistence and privilege escalation.” Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

But GandCrab far eclipsed the success of competing ransomware affiliate programs largely because its authors worked assiduously to update the malware so that it could evade antivirus and other security defenses. It remains unclear how many individuals were active in the core GandCrab malware development team.

article thumbnail

Dutch police arrested the author of Dryad and Rubella Macro Builders

Security Affairs

He is suspected of large-scale production and selling of malware.” “The young man offered programs with names like Rubella, Cetan and Dryad, enabling the buyer to include secret code or malware in amongst others Word or Excel files.” The macro might also purposely attempt to bypass endpoint security defenses. .

Malware 67
article thumbnail

APT trends report Q1 2021

SecureList

In our initial report on Sunburst , we examined the method used by the malware to communicate with its C2 (command-and-control) server and the protocol used to upgrade victims for further exploitation. This campaign made use of a previously unknown malware family we dubbed FourteenHi.

Malware 142