Remove 2017 Remove Antivirus Remove Encryption Remove Malware
article thumbnail

SoNot SoSafe: Android malware disguises itself as secure messaging app

Malwarebytes

This Android app, purported as a secure messaging application that uses end-to-end encryption, is the latest ruse cybercriminals put upon smartphone users, particularly those based in India, to infect their devices with GravityRAT, a piece of malicious software that is known to spy on people and steal their data.

Malware 127
article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware. The infection chain.

Malware 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Persistence of Abusive Certificates in Malware

Security Boulevard

The Persistence of Abusive Certificates in Malware. Trusted applications will not be stopped by antivirus or anti-malware technologies. PKI is an asymmetric system, using two keys to encrypt communications; public and private keys. Attackers can create fake websites to steal credentials and/or deliver malware.

Malware 52
article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Introduction It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. Subsequent analysis revealed earlier instances of suspicious code dating back to 2017.

Malware 107
article thumbnail

Chinese actors behind attacks on industrial enterprises and public institutions

Security Affairs

The emails used weaponized Microsoft Word documents exploiting the CVE-2017-11882 vulnerability. The CVE-2017-11882 flaw is a memory-corruption issue that affects all versions of Microsoft Office released between 2000 and 2017. The vulnerability affects the MS Office component EQNEDT32.EXE

article thumbnail

Mobile malware evolution 2020

SecureList

The mobile malware Trojan-Ransom.AndroidOS.Agent.aq Last year was notable for both malware and adware, the two very close in terms of capabilities. Interestingly enough, the share of adware attacks increased in relation to mobile malware in general. They typically work with malware developers to achieve this.

Mobile 132
article thumbnail

China-linked APT uses a new backdoor in attacks at Russian defense contractor

Security Affairs

The weaponized RTF documents generated with the exploit builder are able to trigger the CVE-2017-11882 , CVE-2018-0798 , CVE-2018-0802 vulnerabilities in Microsoft’s Equation Editor. This tool was widely adopted by several China-linked threat actors, including Tick , Tonto Team and TA428. ” continues the report.

Phishing 131