Remove 2020 Remove Encryption Remove Software
article thumbnail

New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency

SecureList

It spreads via forums posts, torrent trackers and blogs, imitating popular software like Foxit PDF Editor and AutoCAD. These posts refer to the SteelFox dropper as an efficient way to activate a legitimate software product for free. Its parameters are also encrypted — they are decrypted once dropped by the first stage.

Software 121
article thumbnail

RedLine info-stealer campaign targets Russian businesses through pirated corporate software

Security Affairs

An ongoing RedLine information-stealing campaign is targeting Russian businesses using pirated corporate software. Since January 2024, Russian businesses using unlicensed software have been targeted by an ongoing RedLine info-stealer campaign. This method exploits user trust rather than vulnerabilities in the corporate software.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dental group lied through teeth about data breach, fined $350,000

Malwarebytes

A US chain of dental offices known as Westend Dental LLC denied a 2020 ransomware attack and its associated data breach, instead telling their customers that data was lost due to an accidentally formatted hard drive. In October 2020, Westend Dental was attacked by the Medusa Locker ransomware group.

article thumbnail

Operation SyncHole: Lazarus APT goes back to the well

SecureList

We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a sophisticated combination of a watering hole strategy and vulnerability exploitation within South Korean software. We found that the malware was running in the memory of a legitimate SyncHost.

Malware 140
article thumbnail

Authorities released free decryptor for Phobos and 8base ransomware

Security Affairs

The software can be downloaded from the police website and Europol’s NoMoreRansom site. NoMoreRansom warns users to remove the malware first with a reliable antivirus before using the decryptor, or files may be re-encrypted repeatedly. Europol and the FBI are promoting it as an official recovery solution.

article thumbnail

US authorities have indicted Black Kingdom ransomware admin

Security Affairs

“The ransomware either encrypted data from victims computer networks or claimed to take that data from the networks. Black Kingdom ransomware was first spotted in late February 2020 by security researcher GrujaRS , the ransomware encrypts files and appends the.DEMON extension to filenames of the encrypted documents.

article thumbnail

Recent Cyber Attacks: Trends, Tactics, and Countermeasures

Hacker's King

These attacks often involve encrypting data and demanding a ransom for its decryption. Supply Chain Attacks : These attacks target the supply chain rather than individual organizations, exploiting vulnerabilities in third-party software and service providers.