article thumbnail

BotenaGo strikes again – malware source code uploaded to GitHub

CyberSecurity Insiders

As of the publishing of this article, antivirus (AV) vendor detection for BotenaGo and its variants remains behind with very low detection coverage from most of AV vendors. Even more worrisome, the samples continue to have a very low AV detection rate, as shown below in VirusTotal (figure 8). SURICATA IDS SIGNATURES.

Malware 81
article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

Group-IB, a Singapore-based cybersecurity company: ransomware accounted for over half of all malicious mailings in H1 2019 , detected and analyzed by Group-IB’s Computer Emergency Response Team (CERT-GIB), with Troldesh aka Shade being the most popular tool among cybercriminals. More than 80% of all malicious files were disguised as .zip

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SeroXen RAT for sale

CyberSecurity Insiders

It has been historically associated with malicious activity performed by threat actors, APT groups (like in this Mandiant report from 2017), or government attacks (in this report by Unit42 in 2017). Due to its relatively large size, certain antivirus may choose not to analyze it, potentially bypassing detection.

Malware 117
article thumbnail

AT&T Alien Labs finds new Golang malware (BotenaGo) targeting millions of routers and IoT devices with more than 30 exploits

CyberSecurity Insiders

As of the publishing of this article, BotenaGo currently has low antivirus (AV) detection rate with only 6/62 known AVs seen in VirusTotal: (Figure 1). Some AVs detect these new malware variants using Go as Mirai malware — the payload links do look similar. CVE-2017-6077. CVE-2017-18368. CVE-2017-6334.

Malware 85
article thumbnail

Cybercriminal greeners from Iran attack companies worldwide for financial gain

Security Affairs

In some attacks, they attempted to elevate privileges using exploit for CVE-2017-0213. Interestingly, the threat actors likely didn’t have a clear plan on what to do with the compromised networks. For instance, to disable built-in antivirus software, the attackers used Defender Control and Your Uninstaller.

article thumbnail

Fxmsp: the untold story of infamous seller of access to corporate networks who made at least USD 1.5 mln

Security Affairs

Fxmsp gained worldwide fame in May 2019, after it was reported that the networks belonging to leading antivirus software companies had been compromised. In early 2017, he created accounts on several other Russian-speaking forums, including on the infamous exploit[.]in, Geography and victims. Proxy seller. The big fish.

article thumbnail

Kaspersky Lab opens first Transparency Center in Zurich

Security Affairs

From today, malicious and suspicious files shared by users of Kaspersky Lab products in Europe will start to be processed in data centers in Zurich, initiating the first part of a relocation commitment made by the company in late 2017 under its Global Transparency Initiative.