article thumbnail

Who’s Behind the RevCode WebMonitor RAT?

Krebs on Security

The software is broadly classified as malware by most antivirus companies, likely thanks to an advertised feature list that includes dumping the remote computer’s temporary memory; retrieving passwords from dozens of email programs; snarfing the target’s Wi-Fi credentials; and viewing the target’s Webcam.

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

The government says Snatch used a customized ransomware variant notable for rebooting Microsoft Windows devices into Safe Mode — enabling the ransomware to circumvent detection by antivirus or endpoint protection — and then encrypting files when few services are running. ru using the email address tretyakov-files@yandex.ru.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

Security Affairs

Attackers used Twitter profiles for sharing links to a blog under their control ( br0vvnn[.]io The attackers published a blog post titled “DOS2RCE: A New Technique To Exploit V8 NULL Pointer Dereference Bug ” and shared it via Twitter.

Malware 125
article thumbnail

The Persistence of Abusive Certificates in Malware

Security Boulevard

Trusted applications will not be stopped by antivirus or anti-malware technologies. An example of this is the NotPetya Ransomware Worm , where attackers used fraudulent Microsoft certificates in an attempt to bypass antivirus scanners. Antivirus software can require high processing power, due to the in-depth nature of scanning.

Malware 52
article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

Attackers used Twitter profiles for sharing links to a blog under their control ( br0vvnn[.]io The attackers published a blog post titled “DOS2RCE: A New Technique To Exploit V8 NULL Pointer Dereference Bug ” and shared it via Twitter. “If you visited the referenced ZINC-owned blog (br0vvnn[.]io),

Malware 114
article thumbnail

BotenaGo strikes again – malware source code uploaded to GitHub

CyberSecurity Insiders

As of the publishing of this article, antivirus (AV) vendor detection for BotenaGo and its variants remains behind with very low detection coverage from most of AV vendors. Figure 8 shows the low level of antivirus detections for BotenaGo’s new variants. 2027093: ET EXPLOIT Possible Netgear DGN2200 RCE (CVE-2017-6077).

Malware 81
article thumbnail

AT&T Alien Labs finds new Golang malware (BotenaGo) targeting millions of routers and IoT devices with more than 30 exploits

CyberSecurity Insiders

As of the publishing of this article, BotenaGo currently has low antivirus (AV) detection rate with only 6/62 known AVs seen in VirusTotal: (Figure 1). The malware maps each function with a string that represents a potential targeted system — such as a signature, which we’ll explain later in this blog (see figure 3).

Malware 85