Remove Antivirus Remove Article Remove DNS Remove Technology
article thumbnail

Ad blocker with miner included

SecureList

Back then, cybercriminals distributed malware under the guise of the Malwarebytes antivirus installer. This article analyzes only fake AdShield app, but all the other cases follow the same scenario. By the look of it, it appears to be a continuation of the summer campaign covered by our colleagues from Avast. Technical details.

DNS 141
article thumbnail

Satacom delivers browser extension that steals cryptocurrency

SecureList

It is known to use the technique of querying DNS servers to obtain the base64-encoded URL in order to receive the next stage of another malware family currently distributed by Satacom. To do so, it performs a DNS request to don-dns[.]com com (a decrypted HEX string) through Google DNS (8.8.8.8, com don-dns[.]com

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IDS & IPS Remain Important Even as Other Tools Add IDPS Features

eSecurity Planet

Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for decades, yet they remain important cybersecurity tools even in the face of today’s rapidly changing cyber threats and complex IT environments.

article thumbnail

StripedFly: Perennially flying under the radar

SecureList

With the completion of our extensive private investigation report, this article now provides a concise overview of our findings. DNS resolutions for pool servers are cleverly concealed behind DNS over HTTPS requests to the Cloudflare DoH (DNS over HTTPS) service , adding an extra layer of stealth to its operations.

Malware 107
article thumbnail

Bizarro banking Trojan expands its attacks to Europe

SecureList

In this article we analyse the technical features of the Trojan’s components, giving a detailed overview of obfuscation techniques, the infection process and subsequent functions, as well as the social engineering tactics used by the cybercriminals to convince their victims to give away their personal online banking details.

Banking 140
article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

This article will explore the nature of MSSPs and how they can help businesses, nonprofits, governments, and other organizations have better security with less effort. Managed endpoint security installs, configures, and maintains endpoint protection tools ( antivirus , endpoint detection and response (EDR), etc.)

article thumbnail

How to Implement Microsegmentation

eSecurity Planet

As the zero trust architecture ‘s core technology, implementing microsegmentation isn’t about heavily restricting communication within a network. For microsegmentation, it is as much about the process as it is the technology. Also Read: Firewalls as a Service (FWaaS): The Future of Network Firewalls? .