Remove 2017 Remove DDOS Remove DNS Remove Technology
article thumbnail

Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol

SecureList

During an incident response performed by Kaspersky’s Global Emergency Response Team ( GERT ) and GReAT, we uncovered a novel multiplatform threat named “NKAbuse” The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities.

Malware 112
article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

As first detailed by KrebsOnSecurity in July 2016 , Orcus is the brainchild of John “Armada” Rezvesz , a Toronto resident who until recently maintained and sold the RAT under the company name Orcus Technologies. 2017 analysis of the RAT. “It 2017 analysis of the RAT.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Security Affairs

In 2015, Europol partnering with several private technology firms announced the takedown of the Ramnit C2 infrastructure. DDoS attacks, ransomware-based campaigns, cryptocurrency mining campaigns). Malware actor publishes the address of the Bot-A in DNS (or using any other public channel). Bot-B connects to Bot-A.

Malware 47
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Whether perceived or real, a lack of understanding about blockchain technology has slowed the adoption of advanced distributed database technology in the past decade. We’ll look at what blockchain technology is, how its development relates to cybersecurity, and the state of blockchain-based security solutions.

article thumbnail

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

Compared to its predecessors, the sixth “Hi-Tech Crime Trends” report is the first to contain chapters devoted to the main industries attacked and covers the period from H2 2018 to H1 2019, as compared to the period from H2 2017 to H1 2018.

Banking 85
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2017, more than 300,000 WordPress websites were affected by a malicious plugin that allowed an attacker to place embedded hidden links on victim websites. Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. DDoS trojan. See DDoS for reference.

Malware 104
article thumbnail

APT trends report Q1 2022

SecureList

Subsequently, DDoS attacks hit several government websites. The OOXML files have an external reference to the attacker’s server and download an RTF document exploiting the CVE-2017-11882 vulnerability. In December we were made aware of a UEFI firmware-level compromise through logs from our firmware scanning technology.

Malware 135