Remove Cryptocurrency Remove DNS Remove Download Remove Spyware
article thumbnail

Security Affairs newsletter Round 418 by Pierluigi Paganini – International edition

Security Affairs

Twitter confirmed that a security incident publicly exposed Circle tweets FBI seized other domains used by the shadow eBook library Z-Library WordPress Advanced Custom Fields plugin XSS exposes +2M sites to attacks Fortinet fixed two severe issues in FortiADC and FortiOS Pro-Russia group NoName took down multiple France sites, including the French (..)

article thumbnail

IT threat evolution in Q2 2023

SecureList

The attackers were able to embed malicious code into the libffmpeg media processing library to download a payload from their servers. While investigating an infection of a cryptocurrency company in Southeast Asia, we found Gopuram coexisting on target computers with AppleJeus , a backdoor attributed to the Lazarus.

Malware 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 177 – News of the week

Security Affairs

Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Spyware 42
article thumbnail

IT threat evolution Q3 2023

SecureList

To persuade people to download these mods instead of the official app, the developer claimed that they worked faster than other clients thanks to a distributed network of data centers around the world. However, they included an additional module that constantly monitored the messenger and sent data to the spyware creator’s C2 server.

Malware 91
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Adware, also known as malvertising , is a type of malware that downloads or displays advertisements to the user interface. Users sometimes unknowingly infect themselves with adware installed by default when they download and install other applications. Additional features of botnets include spam, ad and click fraud, and spyware.

Malware 105
article thumbnail

IT threat evolution Q1 2022

SecureList

In January, we reported a malicious campaign targeting companies that work with cryptocurrencies, smart contracts, decentralized finance and blockchain technology: the attackers are interested in fintech in general. The campaign has two goals: gathering information and stealing cryptocurrency.

Phishing 103
article thumbnail

NullMixer: oodles of Trojans in a single dropper

SecureList

These websites are often related to crack, keygen and activators for downloading software illegally, and while they may pretend to be legitimate software, they actually contain a malware dropper. The whole infection chain of NullMixer is as follows: The user visits a website to download cracked software, keygens or activators.

Malware 108