article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

For at least the past decade, a computer crook variously known as “ Yalishanda ,” “ Downlow ” and “ Stas_vl ” has run one of the most popular “bulletproof” Web hosting services catering to a vast array of phishing sites, cybercrime forums and malware download servers.

article thumbnail

China-based Fangxiao group behind a long-running phishing campaign

Security Affairs

Researchers from Cyjax reported that a China-based financially motivated group, dubbed Fangxiao, orchestrated a large-scale phishing campaign since 2017. “The Fangxiao campaigns are effective lead generation methods which have been redirected to various domains, from malware, to referral links, to ads and adware.”

Phishing 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

” Microleaves has long been classified by antivirus companies as adware or as a “potentially unwanted program” (PUP), the euphemism that antivirus companies use to describe executable files that get installed with ambiguous consent at best, and are often part of a bundle of software tied to some “free” download.

article thumbnail

Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report

Malwarebytes

of all Mac detections in 2020—the rest can be attributed to Potentially Unwanted Programs (PUPs) and Adware ThiefQuest tricked many researchers into believing it was the first example of ransomware on macOS since 2017, but the malware was hiding its real activity of massive data exfiltration.

Malware 121
article thumbnail

IT threat evolution in Q1 2023. Non-mobile statistics

SecureList

Progress in combating cybercrime Europol and the U.S. The most-exploited vulnerabilities in that category were the following: CVE-2017-11882 and CVE-2018-0802 : Equation Editor vulnerabilities that allow corrupting application memory during formula processing to then run arbitrary code in the system. 2 AdWare.OSX.Amc.e 2 Taiwan 16.01

Mobile 65
article thumbnail

Data Leak Strategy Fueling the Ransomware Economy

SecureWorld News

Back in 2017, these folks compromised Netflix and spilled 10 unreleased episodes of "Orange Is the New Black" TV series via a shady online marketplace after the production company refused to pay the ransom. For the record, this phenomenon isn't exactly new. Remember the news-making story of a hacker group calling themselves The Dark Overlord?