article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Introduction It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. During that time, it had effectively evaded analysis and had previously been misclassified as a cryptocurrency miner.

Malware 120
article thumbnail

Security Affairs newsletter Round 175 – News of the week

Security Affairs

. · Duo Security created open tools and techniques to identify large Twitter botnet. · Group-IB experts record a massive surge of user data leaks form cryptocurrency exchanges. · HP releases firmware updates for two critical RCE flaws in Inkjet Printers. · TSMC Chip Maker confirms its facilities were infected with WannaCry ransomware. (..)

DNS 42
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q1 2022

SecureList

MoonBounce: the dark side of UEFI firmware. Late last year, we became aware of a UEFI firmware-level compromise through logs from our firmware scanner (integrated into Kaspersky products at the start of 2019). The campaign has two goals: gathering information and stealing cryptocurrency. Targeted attacks.

Phishing 117
article thumbnail

DDoS attacks in Q4 2020

SecureList

The DTLS (Datagram Transport Layer Security) protocol is used to establish secure connections over UDP, through which most DNS queries, as well as audio and video traffic, are sent. After the attacks came to light, the manufacturer promptly released a firmware update for configuring verification of incoming requests.

DDOS 136
article thumbnail

APT trends report Q1 2022

SecureList

This application contains a legitimate program called DeFi Wallet, that saves and manages a cryptocurrency wallet, but also implants a malicious file when executed. In December we were made aware of a UEFI firmware-level compromise through logs from our firmware scanning technology. Other interesting discoveries.

Malware 137
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

CISA reported that LokiBot “employs Trojan malware to steal sensitive information such as usernames, passwords, cryptocurrency wallets, and other credentials.” Firmware rootkit. A strain of keylogger malware dubbed LokiBot notably increased in 2020. ” Malicious Mobile Apps. RAM Scraper. Rootkit Type. Description.

Malware 105