Remove 2018 Remove Adware Remove Internet Remove Passwords
article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

The Scranos rootkit malware was first discovered late last year when experts at Bitdefender were analyzing a new password- and data-stealing operation leveraging around a rootkit driver digitally signed with a stolen certificate. . ” reads the report published by Bitdefender. ” continues the repor.t.

Spyware 70
article thumbnail

Threat in your browser: what dangers innocent-looking extensions hold for users

SecureList

All of them were used to siphon off sensitive user data, such as cookies and passwords, and even take screenshots; in total, these malicious extensions were downloaded 32 million times. Since the beginning of 2020, Kaspersky products prevented 6,057,308 users from downloading malware , adware and riskware disguised as browser extensions.

Adware 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

Exploits for CVE-2015-2523 — use-after-free vulnerabilities in Microsoft Excel — and CVE-2018-0802 , which we’ve often written about, were also in demand. Updated adware for the new Macs also immediately appeared, in particular the Pirrit family (whose members placed high in our Top 20 threats for macOS). into the system.

Mobile 87
article thumbnail

Top 9 Cybersecurity Challenges SMEs Currently Face

Responsible Cyber

Small and mid-sized enterprises (SMEs) are increasingly at risk of cyber-attacks, and often serve as a launch pad for larger threat campaigns, according to Cisco’s 2018 SMB Cybersecurity Report. The Internet of Things (IoT) is undeniably the future of technology. IoT Opens Excessive Entry Points.

article thumbnail

IT threat evolution in Q2 2021. PC statistics

SecureList

There appeared the new Qlocker family, which packs user files into a password-protected 7zip archive, plus our old friends ech0raix and AgeLocker began to gather steam. Microsoft Office exploits most often tried to utilize the memory corruption vulnerability CVE-2018-0802. Attacks on NAS devices. Number of new ransomware modifications.

Adware 90
article thumbnail

What Is Malware? Understanding the Basics of Website Malware

SiteLock

Millions of websites across the internet also contain vulnerabilities that make them easy targets. In 2018 alone, we saw thousands of data breaches expose more than 446 million records. In fact, according to our research , a single website will experience nearly 60 attacks a day, and every website on the internet is a potential target.

Malware 98
article thumbnail

IT threat evolution in Q1 2022. Non-mobile statistics

SecureList

When it comes to network threats, this quarter continued to show how cybercriminals often resort to the technique of brute-forcing passwords to gain unauthorized access to various network services, the most popular of which are MSSQL, RDP and SMB. Attacks using the EternalBlue, EternalRomance and similar exploits remain as popular as ever.

Mobile 95