article thumbnail

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware

Security Affairs

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware. The initial stage of these trojans is generally the execution of a dropper in a form of a VBS, JScript, or MSI file that downloads from the Cloud (AWS, Google, etc.) the trojan loader/injector.

Antivirus 113
article thumbnail

Microsoft Patch Tuesday, June 2022 Edition

Krebs on Security

Dubbed “ Follina ,” the flaw became public knowledge on May 27, when a security researcher tweeted about a malicious Word document that had surprisingly low detection rates by antivirus products. “Most malicious Word documents leverage the macro feature of the software to deliver their malicious payload. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

QNodeService Trojan spreads via fake COVID-19 tax relief

Security Affairs

and is delivered through a Java downloader embedded in the.jar file, Trend Micro warns. . “Running this file led to the download of a new, undetected malware sample written in Node.js; this trojan is dubbed as “QNodeService”.” However, the use of an uncommon platform may have helped evade detection by antivirus software.”

Malware 105
article thumbnail

Silver Sparrow, a new malware infects Mac systems using Apple M1 chip

Security Affairs

“The novelty of this downloader arises primarily from the way it uses JavaScript for execution—something we hadn’t previously encountered in other macOS malware—and the emergence of a related binary compiled for Apple’s new M1 ARM64 architecture.” .” reads the analysis published by RedCanary.

Malware 142
article thumbnail

New variant for Mac Malware XCSSET compiled for M1 Chips

Security Affairs

For example, a sample with the MD5 hash sum 914e49921c19fffd7443deee6ee161a4 contains two architectures: x86_64 and ARM64.” “The first one corresponds to previous-generation, Intel-based Mac computers, but the second one is compiled for ARM64 architecture, which means that it can run on computers with the new Apple M1 chip.”

Malware 98
article thumbnail

What Is Bad Rabbit Ransomware?

SiteLock

Disguised as an Adobe Flash Installer, the malware doesn’t travel through traditional types of ransomware attacks like phishing emails, but rather through drive-by downloads on compromised websites. So, while a person thinks they’re visiting a safe website, malware is downloaded from the cybercriminal’s infrastructure onto their computer.

article thumbnail

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

Security Affairs

The most interesting characteristic of the Triada Trojan apart is its modular architecture, which gives it theoretically a wide range of abilities. In March 2018, security researchers at Antivirus firm Dr. Web discovered that 42 models of low-cost Android smartphones are shipped with the Android.Triada.231 231 banking malware.

Mobile 82