Remove Antivirus Remove Architecture Remove Blog Remove Information Security
article thumbnail

Experts spotted Syslogk, a Linux rootkit under development

Security Affairs

Researchers from antivirus firm Avast spotted a new Linux rootkit, dubbed ‘Syslogk,’ that uses specially crafted “magic packets” to activate a dormant backdoor on the device. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. Pierluigi Paganini.

Malware 79
article thumbnail

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

Security Affairs

The most interesting characteristic of the Triada Trojan apart is its modular architecture, which gives it theoretically a wide range of abilities. In March 2018, security researchers at Antivirus firm Dr. Web discovered that 42 models of low-cost Android smartphones are shipped with the Android.Triada.231 231 banking malware.

Mobile 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware

Security Affairs

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware. As mentioned, in general, this trojan was developed using the same architecture of other Latin American trojans, and the main steps of the infection chain are described below and analyzed in-depth during the next sections of this article.

Antivirus 118
article thumbnail

Woody RAT: A new feature-rich malware spotted in the wild

Malwarebytes

This blog post was authored by Ankur Saini and Hossein Jazi. In this blog post, we will analyze Woody Rat’s distribution methods, capabilities as well as communication protocol. The threat actor has left some debugging information including a pdb path from which we derived and picked a name for this new Rat: Debug Information.

Malware 108
article thumbnail

Woody RAT: A new feature-rich malware spotted in the wild

Malwarebytes

This blog post was authored by Ankur Saini and Hossein Jazi. In this blog post, we will analyze Woody Rat's distribution methods, capabilities as well as communication protocol. The used lure is in Russian is called " Information security memo " which provide security practices for passwords, confidential information, etc.

Malware 65
article thumbnail

A new trojan Lampion targets Portugal

Security Affairs

This is a clear signal that most of the antivirus engines don’t detect yet the malware signature. The file is extremely large (32 MB), with a lot of junk allowing, thus, to evade antivirus engines as a result. He is also a founding member and Pentester at CSIRT.UBI and founder of the security computer blog seguranca–informatica.pt.

Malware 96
article thumbnail

Experts spotted P2P worm spreading Crypto-Miners in the wild

Security Affairs

Code Snippet 3: Choose of the files to copy whether the target architecture is x86 or x64. Technical details, including IoCs and Yara Rules, are available in the analysis published in the Yoroi blog. Its content is minimal and quickly redirect the execution to a small batch file, “installer.bat” contained in the same folder.

Malware 72